Abstract
Internet of Things can be simply referred to as Internet of entirety which is the network of things enclosed with software, sensors, electronics that allow them to gather and transmit the data. Because of the various and progressively malevolent assaults on PC systems and frameworks, current security apparatuses are frequently insufficient to determine the issues identified with illegitimate clients, unwavering quality, and to give vigorous system security. Late research has demonstrated that in spite of the fact that system security has built up, a significant worry about an expansion in illicit interruptions is as yet happening. Addressing security on every occasion or in every place is a really important and sensitive matter for many users, businesses, governments, and enterprises. In this research work, we are going to propose a secure IoT architecture for routing in a network. It mainly aims to locate the malicious users in IoT routing protocols. The proposed mechanism is compared with the state-of-the-art work and the results show that the proposed work performs well.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
G. Montenegro, N. Kushalnagar, J. Hui, D. Culler, Transmission of IPv6 packets over IEEE 802.15.4 networks, in IETF RFC 4944, Sept. 2007. https://tools.ietf.org/html/rfc4944
J. Hui, P. Thubert, Compression format for IPv6 datagrams over IEEE 802.15.4‐based networks, in IETF RFC 6262, Sept 2011. https://tools.ietf.org/html/rfc6282.
H. Tschofenig, T. Fossati, Transport layer security (TLS)/datagram transport layer security (DTLS) profiles for the Internet of Things, in IETF RFC 7925, July 2016. https://tools.ietf.org/html/rfc7925
E. Kim, D. Kaspar, J. Vasseur, Design and application spaces for IPv6 over low‐power wireless personal area networks (6LoWPANs), in IETF RFC 6568, Apr. 2012. https://www.ietf.org/rfc/rfc6568.txt
P. Pongle, G. Chavan, A survey: attacks RPL and 6LowPAN in IoT, in International Conference on Pervasive Computing (ICPC 2015), Pune, India (2015), pp. 1–6
L. Wallgren, S. Raza, T. Voigt, Routing attacks and countermeasures in the RPL based internet of things. Int. J. Distrib. Sens. Netw. 9(8), 1–11 (2013)
TCG, Guidance for securing IoT using TCG technology, Sept. 2015. https://www.trustedcomputinggroup.org/guidancesecuring-iot-using-tcg-technology-reference-document
A. Roger, T. Tsao, V. Daza, A. Lozano, M. Richardson, M. Dohler,A security threat analysis for the routing protocol for low-power and lossy networks (RPLs), in IETF RFC 7416, Jan. 2015. https://tools.ietf.org/html/rfc7416
H. Baba, Y. Ishida, T. Amatsu, K. Maeda, Problems in and among industries for the prompt realization of IoT and safety considerations, IETF Draft, Oct. 2016. https://datatracker.ietf.org/doc/draft-baba-iot-problems
M.A. Iqbal, M. Bayoumi, Secure end-to-end key establishment protocol for resource-constrained healthcare sensors in the context of IoT, in International Conference on High Performance Computing & Simulation (HPCS) (2016), pp. 523–530
J.L. Hernandez-Ramos, J.B. Bernabe, A. Skarmeta, ARMY: architecture for a secure and privacy-aware lifecycle of smart objects in the internet of my things. IEEE Commun. Mag. 54(9), 28–35 (2016)
D. Hardt, The OAuth 2.0 authorization framework, in IETF RFC 6749, Oct. 2012. https://www.ietf.org/rfc/rfc6749.txt
S. Gerdes, L. Seitz, S. Gerdes, G. Selander, An architecture for authorization in constrained environments, in IETF Draft, Aug. 2016. https://www.ietf.org/id/draft-ietf-ace-actors-04.txt
O. Garcia-Morchon, S. Kumar, M. Sethi, Security considerations in the IP-based Internet of Things, in IETF Draft, Feb. 2017, Available: https://www.ietf.org/id/draft-irtf-t2trg-iot-seccons-01.txt.
K. Moore, R. Barnes, H. Tschofenig, Best current practices for securing Internet of Things (IoT) devices, in IETF Draft, Oct. 2016. https://tools.ietf.org/html/draft-moore-iot-security-bcp-00.
V.H. La, R. Fuentes, A.R. Cavalli,A novel monitoring solution for 6LoWPAN-based wireless sensor networks,in 22nd Asia-Pacific Conference on Communications (APCC) (2016), pp. 230–237
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Santhi Sri, K., Sandhya Krishna, P., Lakshman Narayana, V., Khadherbhi, R. (2021). Traffic Analysis Using IoT for Improving Secured Communication. In: Reddy, A., Marla, D., Favorskaya, M.N., Satapathy, S.C. (eds) Intelligent Manufacturing and Energy Sustainability. Smart Innovation, Systems and Technologies, vol 213. Springer, Singapore. https://doi.org/10.1007/978-981-33-4443-3_48
Download citation
DOI: https://doi.org/10.1007/978-981-33-4443-3_48
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-33-4442-6
Online ISBN: 978-981-33-4443-3
eBook Packages: EngineeringEngineering (R0)