Skip to main content
Top

2021 | OriginalPaper | Chapter

IoT Security Architecture with TEA for DoS Attacks Prevention

Authors : Vishal Sharma, Anand Sharma

Published in: Advances in Information Communication Technology and Computing

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The Internet of Things (IoT) is important in now a day’s development of wireless networks enabling to acquire information from the environment, devices, and machines. A number of applications have been implemented in various kinds of technologies. IoT has high coverage to security attacks and threats. There are a number of requirements in terms of security. Confidentiality is one of the main concerns in the wireless network. Integrity and availability are key matters along with the confidentiality. This research focuses on identifying the DoS attacks that can occur in IoT. This paper uses Tiny Encryption Algorithm (TEA) to address these above mentioned security matters. From the algorithms, our proposed solutions can control DoS attack on IoT and any other networks of small devices.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Grabovica M, Popić S, Pezer D, Knežević V (2016) Provided security measures of enabling technologies in Internet of Things (IoT): a survey. Zooming Innovation in Cosr Elect Intnl Conf Grabovica M, Popić S, Pezer D, Knežević V (2016) Provided security measures of enabling technologies in Internet of Things (IoT): a survey. Zooming Innovation in Cosr Elect Intnl Conf
2.
go back to reference Navarro M, Davis TW, Villalba G, Li Y, Zhong X, Erratt N (2014) Towards long-term multi-hop WSN deployments for environmental monitoring: an experimental network evaluation. JSAN 3:297–330CrossRef Navarro M, Davis TW, Villalba G, Li Y, Zhong X, Erratt N (2014) Towards long-term multi-hop WSN deployments for environmental monitoring: an experimental network evaluation. JSAN 3:297–330CrossRef
3.
go back to reference Saha S, Matsumoto M (2007) A framework for disaster management system and WSN protocol for rescue operation. In: TENCON IEEE Conference, pp 1–4 Saha S, Matsumoto M (2007) A framework for disaster management system and WSN protocol for rescue operation. In: TENCON IEEE Conference, pp 1–4
4.
go back to reference Vaidehi V, Vardhini M, Yogeshwaran H, Inbasagar G, Bhargavi R, Hemalatha CS (2013) Agent based health monitoring of elderly people in indoor environments using wireless sensor networks. Procedia Comp Sci 19:64–71CrossRef Vaidehi V, Vardhini M, Yogeshwaran H, Inbasagar G, Bhargavi R, Hemalatha CS (2013) Agent based health monitoring of elderly people in indoor environments using wireless sensor networks. Procedia Comp Sci 19:64–71CrossRef
5.
go back to reference Xu R, Huang X, Zhang J, Lu Y, Wu G (2015) Software defined intelligent building. Int J Inf Secur Privacy (IJISP) 9(3):84–99CrossRef Xu R, Huang X, Zhang J, Lu Y, Wu G (2015) Software defined intelligent building. Int J Inf Secur Privacy (IJISP) 9(3):84–99CrossRef
6.
go back to reference Linlu L (2014) Comparative study on the development of internet of things policy in China and European Union Based. Sci Tech Info Dev Ec Linlu L (2014) Comparative study on the development of internet of things policy in China and European Union Based. Sci Tech Info Dev Ec
7.
go back to reference Zhao K, Ge L (2013) A survey on the Internet of Things Security. In: ICCIS, pp 663–667 Zhao K, Ge L (2013) A survey on the Internet of Things Security. In: ICCIS, pp 663–667
8.
go back to reference Alanazi S, Al-Muhtadi J, Derhab A, Saleem K (2015) On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications. In: ICENAS Alanazi S, Al-Muhtadi J, Derhab A, Saleem K (2015) On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications. In: ICENAS
9.
go back to reference Alanazi S, Al-Muhtadi J, Derhab A, Saleem K (2015) On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications. In: ICENAS Alanazi S, Al-Muhtadi J, Derhab A, Saleem K (2015) On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications. In: ICENAS
10.
go back to reference Atzori L, lera A, Morabito G (2010) The internet of thigs: a survey. Comp Netwks 54: 2787–2805 Atzori L, lera A, Morabito G (2010) The internet of thigs: a survey. Comp Netwks 54: 2787–2805
11.
go back to reference Katagi M, Moriai S (2008) Lightweight cryptography for the internet of things. Sony Corp 7–10 Katagi M, Moriai S (2008) Lightweight cryptography for the internet of things. Sony Corp 7–10
12.
go back to reference Ebrahim M, Khan S, Mohani SSUH (2014) Peer-to-peer network simulators: an analytical review Ebrahim M, Khan S, Mohani SSUH (2014) Peer-to-peer network simulators: an analytical review
13.
go back to reference Ebrahim M, Khan S, Khalid UB (2014) Symmetric algorithm survey: a comparative analysis. IJCA 61(20):0975–8887 Ebrahim M, Khan S, Khalid UB (2014) Symmetric algorithm survey: a comparative analysis. IJCA 61(20):0975–8887
14.
go back to reference Lim CH, Korkishko T (2005) mcrypton–a lightweight block cipher for security of low-cost RFID tags and sensors. Info Sec App Springer, pp 243–258 Lim CH, Korkishko T (2005) mcrypton–a lightweight block cipher for security of low-cost RFID tags and sensors. Info Sec App Springer, pp 243–258
15.
go back to reference Lim CH (1998) Crypton: a new 128-bit block cipher. In: NIST AEs Prop. Lim CH (1998) Crypton: a new 128-bit block cipher. In: NIST AEs Prop.
16.
go back to reference Engels D, Fan X, Gong G, Hu H, Smith EM (2009) Ultralight weight cryptography for low-cost RFID tags: Hummingbird algorithm and protocol. CACR Tech Rpts 29 Engels D, Fan X, Gong G, Hu H, Smith EM (2009) Ultralight weight cryptography for low-cost RFID tags: Hummingbird algorithm and protocol. CACR Tech Rpts 29
17.
go back to reference Engels D, Saarinen MJO, Schweitzer P, Smith EM (2011) The hummingbird-2 lightweight authenticated encryption algorithm. RFID Sec. & Privacy. Springer, pp 19–31 Engels D, Saarinen MJO, Schweitzer P, Smith EM (2011) The hummingbird-2 lightweight authenticated encryption algorithm. RFID Sec. & Privacy. Springer, pp 19–31
18.
go back to reference Zhang K, Ding L, Guan J (2012) Cryptanalysis of hummingbird-2. IACR Crypt. ePrint Arc., vol 2012, p 207 Zhang K, Ding L, Guan J (2012) Cryptanalysis of hummingbird-2. IACR Crypt. ePrint Arc., vol 2012, p 207
19.
go back to reference Ganesan P, Venugopalan R, Peddabachagari P, Dean A, Mueller F, Sichitiu M (2003) Analyzing and modeling encryption overhead for sensor network nodes. In: Proceedings of the 2nd ICWSNA. ACM, pp 151–159 Ganesan P, Venugopalan R, Peddabachagari P, Dean A, Mueller F, Sichitiu M (2003) Analyzing and modeling encryption overhead for sensor network nodes. In: Proceedings of the 2nd ICWSNA. ACM, pp 151–159
20.
go back to reference Schneier B (2007) Applied cryptography: protocols, algorithms, and source code in C. Wiley Schneier B (2007) Applied cryptography: protocols, algorithms, and source code in C. Wiley
21.
go back to reference Lai X (1992) On the design and security of block ciphers. Ph.D. diss., Diss. Techn. Wiss ETH Z¨urich, Nr. 9752, 1992. Ref.: Massey JL, Korref, uhlmann HB Lai X (1992) On the design and security of block ciphers. Ph.D. diss., Diss. Techn. Wiss ETH Z¨urich, Nr. 9752, 1992. Ref.: Massey JL, Korref, uhlmann HB
Metadata
Title
IoT Security Architecture with TEA for DoS Attacks Prevention
Authors
Vishal Sharma
Anand Sharma
Copyright Year
2021
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-5421-6_22