Analysis of Security methods in Internet of Things
S. M, and N. P. International Journal on Recent and Innovation Trends in Computing and Communication, 3 (4):
1970--1974(April 2015)
DOI: 10.17762/ijritcc2321-8169.150446
Abstract
Internet of Things (IoT) is a new revolution for the internet. IoT is to enable things to be connected anytime, anyplace, with anything and anyone ideally using any path/network and any service. In addition, the Internet of Things can be providing variety applications via convergence with other technology such as machine-to-machine, Wireless Sensor Network, and Web technology. In this paper describes the analysis of security methods in the area of IoT and also describes a protocol which combines zero knowledge proof and key exchange algorithm to provide secure and authenticated communication that can be applied in IoT environment.
%0 Journal Article
%1 C_2015
%A M, Saranya. C.
%A P, Nitha. K.
%D 2015
%I Auricle Technologies, Pvt., Ltd.
%J International Journal on Recent and Innovation Trends in Computing and Communication
%K (IoT) Applications GMWZKP Internet IoT Security Things in methods of
%N 4
%P 1970--1974
%R 10.17762/ijritcc2321-8169.150446
%T Analysis of Security methods in Internet of Things
%U http://dx.doi.org/10.17762/ijritcc2321-8169.150446
%V 3
%X Internet of Things (IoT) is a new revolution for the internet. IoT is to enable things to be connected anytime, anyplace, with anything and anyone ideally using any path/network and any service. In addition, the Internet of Things can be providing variety applications via convergence with other technology such as machine-to-machine, Wireless Sensor Network, and Web technology. In this paper describes the analysis of security methods in the area of IoT and also describes a protocol which combines zero knowledge proof and key exchange algorithm to provide secure and authenticated communication that can be applied in IoT environment.
@article{C_2015,
abstract = {Internet of Things (IoT) is a new revolution for the internet. IoT is to enable things to be connected anytime, anyplace, with anything and anyone ideally using any path/network and any service. In addition, the Internet of Things can be providing variety applications via convergence with other technology such as machine-to-machine, Wireless Sensor Network, and Web technology. In this paper describes the analysis of security methods in the area of IoT and also describes a protocol which combines zero knowledge proof and key exchange algorithm to provide secure and authenticated communication that can be applied in IoT environment.},
added-at = {2015-08-21T07:37:48.000+0200},
author = {M, Saranya. C. and P, Nitha. K.},
biburl = {https://www.bibsonomy.org/bibtex/2ba16c42b834d91112ff37419a65f1a18/ijritcc},
doi = {10.17762/ijritcc2321-8169.150446},
interhash = {46648d83c1eba6266816b5c772756a2e},
intrahash = {ba16c42b834d91112ff37419a65f1a18},
journal = {International Journal on Recent and Innovation Trends in Computing and Communication},
keywords = {(IoT) Applications GMWZKP Internet IoT Security Things in methods of},
month = {april},
number = 4,
pages = {1970--1974},
publisher = {Auricle Technologies, Pvt., Ltd.},
timestamp = {2015-08-21T07:37:48.000+0200},
title = {Analysis of Security methods in Internet of Things},
url = {http://dx.doi.org/10.17762/ijritcc2321-8169.150446},
volume = 3,
year = 2015
}