Mostrar el registro sencillo del ítem

dc.contributor.authorDejene, Dawit
dc.contributor.authorTiwari, Basant
dc.contributor.authorTiwari, Vivek
dc.date2020-12
dc.date.accessioned2022-04-05T09:40:11Z
dc.date.available2022-04-05T09:40:11Z
dc.identifier.issn1989-1660
dc.identifier.urihttps://reunir.unir.net/handle/123456789/12812
dc.description.abstractThe Internet of Things (IoT) is an emerging technology, which comprises wireless smart sensors and actuators. Nowadays, IoT is implemented in different areas such as Smart Homes, Smart Cities, Smart Industries, Military, eHealth, and several real-world applications by connecting domain-specific sensors. Designing a security model for these applications is challenging for researchers since attacks (for example, zero-day) are increasing tremendously. Several security methods have been developed to ensure the CIA (Confidentiality, Integrity, and Availability) for Industrial IoT (IIoT). Though these methods have shown promising results, there are still some security issues that are open. Thus, the security and authentication of IoT based applications become quite significant. In this paper, we propose TD2SecIoT (Temporal, Data-Driven and Dynamic Network Layer Based Security Architecture for Industrial IoT), which incorporates Elliptic Curve Cryptography (ECC) and Nth-degree Truncated Polynomial Ring Units (NTRU) methods to ensure confidentiality and integrity. The proposed method has been evaluated against different attacks and performance measures (quantitative and qualitative) using the Cooja network simulator with Contiki-OS. The TD2SecIoT has shown a higher security level with reduced computational cost and time.es_ES
dc.language.isoenges_ES
dc.publisherInternational Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI)es_ES
dc.relation.ispartofseries;vol. 6, nº 4
dc.relation.urihttps://www.ijimai.org/journal/bibcite/reference/2824es_ES
dc.rightsopenAccesses_ES
dc.subjectcryptographyes_ES
dc.subjectelliptic curve cryptography (ECC)es_ES
dc.subjectinternet of thingses_ES
dc.subjectNth-degree truncated polynomial ring units (NTRU)es_ES
dc.subjectsecurityes_ES
dc.subjectconfidencialityes_ES
dc.subjectintegrityes_ES
dc.subjectconfidentiality, integrity, and Availability (CIA)es_ES
dc.subjectIJIMAIes_ES
dc.titleTD2SecIoT: Temporal, Data-Driven and Dynamic Network Layer Based Security Architecture for Industrial IoTes_ES
dc.typearticlees_ES
reunir.tag~IJIMAIes_ES
dc.identifier.doihttps://doi.org/10.9781/ijimai.2020.10.002


Ficheros en el ítem

Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem