مقاله انگلیسی رایگان در مورد چارچوب امنیتی هوشمند برای رمزنگاری دستگاههای اینترنت اشیا – IEEE 2018

IEEE

 

مشخصات مقاله
ترجمه عنوان مقاله چارچوب امنیتی هوشمند برای رمزنگاری دستگاههای اینترنت اشیا مبتنی بر معماری امنیت نقطه به نقطه
عنوان انگلیسی مقاله Intelligent security framework for iot devices cryptography based end-to-end security architecture
انتشار مقاله سال ۲۰۱۸
تعداد صفحات مقاله انگلیسی ۵ صفحه
هزینه دانلود مقاله انگلیسی رایگان میباشد.
پایگاه داده نشریه IEEE
مقاله بیس این مقاله بیس نمیباشد
فرمت مقاله انگلیسی  PDF
رشته های مرتبط مهندسی کامپیوتر، فناوری اطلاعات
گرایش های مرتبط رایانش ابری، مهندسی نرم افزار، امنیت اطلاعات، اینترنت و شبکه های گسترده
نوع ارائه مقاله
کنفرانس
مجله / کنفرانس کنفرانس بین المللی سیستم های نوین و کنترل – International Conference on Inventive Systems and Control
دانشگاه Research Scholar – Dept. of IT – Alpha College of Engineering – India
کلمات کلیدی امنیت IoT؛ اینترنت اشیا؛ رمزنگاری؛ حمله کوانتومی؛ احراز هویت؛ رمزگذاری نامتقارن؛ رمزگذاری متقارن؛ رمزنگاری؛ DDOS
کلمات کلیدی انگلیسی IoT Security; Internet of Thing; cryptography;quantum attack;authentication;Asymmetric Encryption;Symmetric Encryption; cryptography;DDOS
شناسه دیجیتال – doi
https://doi.org/10.1109/ICISC.2017.8068718
کد محصول E9962
وضعیت ترجمه مقاله  ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید.
دانلود رایگان مقاله دانلود رایگان مقاله انگلیسی
سفارش ترجمه این مقاله سفارش ترجمه این مقاله

 

فهرست مطالب مقاله:
Abstract
I INTRODUCTION
II REVIEW OF PREVIOUS WORK
III INTELLIGENT SECURITY FRAMEWORK
IV CONCLUSION
References

 

بخشی از متن مقاله:
Abstract

Internet of Thing (IoT) provide services by linking the different platform devices. They have the limitation in providing intelligent service. The IoT devices are heterogeneous which includes wireless sensors to less resource constrained devices. These devices are prone to hardware/software and network attacks. If not properly secured, it may lead to security issues like privacy and confidentiality. To resolve the above problem, an Intelligent Security Framework for IoT Devices is proposed in this paper. The proposed method is made up of (1) the light weight Asymmetric cryptography for securing the EndTo-End devices which protects the IoT service gateway and the low power sensor nodes and (2) implements Lattice-based cryptography for securing the Broker devices/Gateway and the cloud services. The proposed architecture implements Asymmetric Key Encryption to share session key between the nodes and then uses this session key for message transfer This protects the system from Distributed Denial of Service Attacks, eavesdropping and Quantum algorithm attacks. The proposed protocol uses the unique Device ID of the sensors to generate key pair to establish mutual authentication between Devices and Services. Finally, the Mutual authentication mechanism is implemented in the gateway.

INTRODUCTION

In [3] they proposed a secure IoT framework to ensure an End-To-End security from an IoT application to IoT devices. The combination of cloud computing and IoT enables ubiquitous sensing services and powerful processing of sensing data streams [13]. The IoT typically has a three-layer architecture consisting of Perception (sensing Device Domain), Network (networking Domain), and Application layers (Cloud Domain). Each IoT layer is susceptible to either active or passive threats and attacks, that can originate from external sources or internal network. The Internet of Things (IoT) is moving from a centralized structure to a complex network of decentralized smart devices. In [12], [14] IoT devices and services are susceptible to Denial of Service attacks (DoS). Eavesdropper collusion is a significant threat to wireless communication security. Security must be addressed throughout the device lifecycle, from the initial design to the operational environment. the tough challenges of the Internet of Things solutions face are how to get extra bit of battery life for the innovative IoT solutions and the power constraints in communication. First, we propose the Intelligent Security Framework for End -To- End security [16]. Second, the paper gives an overview of the cryptography method associated with. A. Symmetric and Asymmetric Key Encryption Asymmetric encryption systems have high overhead , they are not usable to provide full-time, real-world security.the public key is used for encryption and the private key for decryption during the initial handshake process, which allows the two parties to confidentially set up and exchange a newlycreated “shared key”. The shared keys are used for secure communication and it is valid for its current session .This reduces the IoT nodes and Devices gateways key transfer overhead. The rest of the paper is organized as follows. Section II reviewed the previous work in in literature. Section III specified the proposed protocol. Finally, Sect. IV presented the conclusion.

ارسال دیدگاه

نشانی ایمیل شما منتشر نخواهد شد.