Skip to main content

Traffic Analysis Using IoT for Improving Secured Communication

  • Conference paper
  • First Online:
Intelligent Manufacturing and Energy Sustainability

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 213))

Abstract

Internet of Things can be simply referred to as Internet of entirety which is the network of things enclosed with software, sensors, electronics that allow them to gather and transmit the data. Because of the various and progressively malevolent assaults on PC systems and frameworks, current security apparatuses are frequently insufficient to determine the issues identified with illegitimate clients, unwavering quality, and to give vigorous system security. Late research has demonstrated that in spite of the fact that system security has built up, a significant worry about an expansion in illicit interruptions is as yet happening. Addressing security on every occasion or in every place is a really important and sensitive matter for many users, businesses, governments, and enterprises. In this research work, we are going to propose a secure IoT architecture for routing in a network. It mainly aims to locate the malicious users in IoT routing protocols. The proposed mechanism is compared with the state-of-the-art work and the results show that the proposed work performs well.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. G. Montenegro, N. Kushalnagar, J. Hui, D. Culler, Transmission of IPv6 packets over IEEE 802.15.4 networks, in IETF RFC 4944, Sept. 2007. https://tools.ietf.org/html/rfc4944

  2. J. Hui, P. Thubert, Compression format for IPv6 datagrams over IEEE 802.15.4‐based networks, in IETF RFC 6262, Sept 2011. https://tools.ietf.org/html/rfc6282.

  3. H. Tschofenig, T. Fossati, Transport layer security (TLS)/datagram transport layer security (DTLS) profiles for the Internet of Things, in IETF RFC 7925, July 2016. https://tools.ietf.org/html/rfc7925

  4. E. Kim, D. Kaspar, J. Vasseur, Design and application spaces for IPv6 over low‐power wireless personal area networks (6LoWPANs), in IETF RFC 6568, Apr. 2012. https://www.ietf.org/rfc/rfc6568.txt

  5. P. Pongle, G. Chavan, A survey: attacks RPL and 6LowPAN in IoT, in International Conference on Pervasive Computing (ICPC 2015), Pune, India (2015), pp. 1–6

    Google Scholar 

  6. L. Wallgren, S. Raza, T. Voigt, Routing attacks and countermeasures in the RPL based internet of things. Int. J. Distrib. Sens. Netw. 9(8), 1–11 (2013)

    Article  Google Scholar 

  7. TCG, Guidance for securing IoT using TCG technology, Sept. 2015. https://www.trustedcomputinggroup.org/guidancesecuring-iot-using-tcg-technology-reference-document

  8. A. Roger, T. Tsao, V. Daza, A. Lozano, M. Richardson, M. Dohler,A security threat analysis for the routing protocol for low-power and lossy networks (RPLs), in IETF RFC 7416, Jan. 2015. https://tools.ietf.org/html/rfc7416

  9. H. Baba, Y. Ishida, T. Amatsu, K. Maeda, Problems in and among industries for the prompt realization of IoT and safety considerations, IETF Draft, Oct. 2016. https://datatracker.ietf.org/doc/draft-baba-iot-problems

  10. M.A. Iqbal, M. Bayoumi, Secure end-to-end key establishment protocol for resource-constrained healthcare sensors in the context of IoT, in International Conference on High Performance Computing & Simulation (HPCS) (2016), pp. 523–530

    Google Scholar 

  11. J.L. Hernandez-Ramos, J.B. Bernabe, A. Skarmeta, ARMY: architecture for a secure and privacy-aware lifecycle of smart objects in the internet of my things. IEEE Commun. Mag. 54(9), 28–35 (2016)

    Article  Google Scholar 

  12. D. Hardt, The OAuth 2.0 authorization framework, in IETF RFC 6749, Oct. 2012. https://www.ietf.org/rfc/rfc6749.txt

  13. S. Gerdes, L. Seitz, S. Gerdes, G. Selander, An architecture for authorization in constrained environments, in IETF Draft, Aug. 2016. https://www.ietf.org/id/draft-ietf-ace-actors-04.txt

  14. O. Garcia-Morchon, S. Kumar, M. Sethi, Security considerations in the IP-based Internet of Things, in IETF Draft, Feb. 2017, Available: https://www.ietf.org/id/draft-irtf-t2trg-iot-seccons-01.txt.

  15. K. Moore, R. Barnes, H. Tschofenig, Best current practices for securing Internet of Things (IoT) devices, in IETF Draft, Oct. 2016. https://tools.ietf.org/html/draft-moore-iot-security-bcp-00.

  16. V.H. La, R. Fuentes, A.R. Cavalli,A novel monitoring solution for 6LoWPAN-based wireless sensor networks,in 22nd Asia-Pacific Conference on Communications (APCC) (2016), pp. 230–237

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Santhi Sri .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Santhi Sri, K., Sandhya Krishna, P., Lakshman Narayana, V., Khadherbhi, R. (2021). Traffic Analysis Using IoT for Improving Secured Communication. In: Reddy, A., Marla, D., Favorskaya, M.N., Satapathy, S.C. (eds) Intelligent Manufacturing and Energy Sustainability. Smart Innovation, Systems and Technologies, vol 213. Springer, Singapore. https://doi.org/10.1007/978-981-33-4443-3_48

Download citation

  • DOI: https://doi.org/10.1007/978-981-33-4443-3_48

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-33-4442-6

  • Online ISBN: 978-981-33-4443-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics