Review on Internet of Things Attacks and Their Countermeasure using Lightweight Cipher Algorithms
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
Research on the architecture of IoT in advanced computing theory and engineering. 2010.
Jozef Glovaa,, Tomáš Sabola , Viliam Vajdaa, “Business Models for the Internet of Things Environment,†ScienceDirect , 15 ( 2014 ) 1122 – 1129 .
S.C.B. Intelligence, Disruptive civil technologies, in: Six Technologies with Potential Impacts on US Interests Out to 2025, 2008.
https://www.postscapes.com/internet-of-things-history/
Carnegie Mellon University – CMU SCS Coke Machine
Transmitter.ieee.org
Jozef Glovaa, Tomáš Sabola, Viliam Vajdaa,†Business Models for the Internet of Things Environment,†Elsevier science direct volume 15, 2014, Pages 1122-1129.
Grant Ho Derek Leung, Pratyush Mishra, Ashkan,Hosseini, Dawn Song, David Wagner,†Smart Locks: Lessons for Securing commodity internet of things devices,†ACM, ’16 May 30-June 03, 2016.
Rolf H. Weber,†Internet of Things – New security and privacy challenges,†ELSEVIER science direct.
GAN Gang,LU Zeyong,JIANG Jun,â€Internet of Things Security Analysis,†IEEE 30 August 2011.
Somayya Madakam, R. Ramaswamy, Siddharth Tripathi,†Internet of Things (IoT): A Literature review,†scientific research Vol.3 No.5, May 2015.
Shubham Bhatia1, Abhishek Chauhan2, Vaibhav K. Nigam3, “The Internet of Things: A Survey on Technology and Trends†International Research Journal of Engineering and Technology,†(IRJET).
Rolf H. Weber, Evelyne Studer ,†Cybersecurity in the Internet of Things: Legal aspects,†ESLSEVIER
1016/j.clsr.2016.07.002.
www.nist.gov
Nilesh Mali1, Prof A. B. Kanwade,’ “A Review on Smart City through Internet of Things (IOT),â€Volume 2, Issue 6, June 2016
K. Niranjana Devi, R. Muthuselvi,†Secret Sharing of IoT Healthcare Data Using cryptographic algorithm,†International Journal of Engineering Research Volume No.5 20 May 2016.
Arlene E. Chung, MD, MHA, MMCi, Roxanne E. Jensen, PhD, and Ethan M. Basch, MD, MSc. “Leveraging Emerging Technologiesand the “Internet of Things†to Improve the Quality of Cancer Care,†jop.ascopubs.org ,Volume 12 / Issue 10 / October 2016.
B. Karakostas, “A dns architecture for the internet of things: A case study in transport logistics,†Procedia Computer Science, vol. 19, pp.594–601, 2013.
NISTIR 8114 Report on Lightweight Cryptography Kerry A. McKay Larry Bassham Meltem SönmezTuran Nicky Mouha Computer Security Division Information technology laboratory, march 2017.
International Standard ISO/IEC Information Technology - Security Techniques. Lightweight Cryptography. 2012.
Bogdanov A, Knudsen L.R, Leander G, Paar C, Poschmann A, Robshaw MJ, Seurin Y, Vikkelsoe C. Present: “An Ultra- Lightweight Block Cipher. Berlin Heidelb,â€: Springer; 2007. p.0 450–66.
Ray Beaulieu, Douglas Shors ,Jason Smith, Stefan Treatman-Clark ,Bryan Weeks, Louis Wingers,â€THE SIMON AND SPECK FAMILIES OF LIGHTWEIGHT BLOCK CIPHERS,†National Security Agency 9800 Savage Road, Fort Meade, MD 20755, USA, 19 June 2013.
Gaurav Bansod*, Narayan Pisharoty, and Abhijit Patil, “ PICO : An Ultra Lightweight and Low Power Encryption Design for Ubiquitous Computing,†Defence Science Journal, Vol. 66, No. 3, May 2016, pp. 259-265.
Shivlal Mewada, Pradeep Sharma, S. S. Gautam,†Exploration of efficient symmetric AES algorithm,â€,IEEE, 19 September 2016, 10.1109/CDAN.2016.7570921
C.P. Sotiriou, Y. Papaefstathiou.†Design-space exploration of a cryptography algorithm,†IEEE, 01 June 2004, 10.1109/ICECS.2003.1301922.
Dudhatra Nilesh, Malti Nagle,†The new cryptography algorithm with high throughput,tâ€,IEEE, 16 October 2014, 10.1109/ICCCI.2014.6921739.
Gaurav Bansod, Narayan Pisharoty, and Abhijit Patil,†PICO : An Ultra Lightweight and Low Power Encryption Design for Ubiquitous Computing, †Defence Science Journal, Vol. 66, No. 3, May 2016,