10 research outputs found
Synchronous Relaying Of Sensor Data
In this paper we have put forth a novel methodology to relay data obtained by
inbuilt sensors of smart phones in real time to remote database followed by
fetching of this data . Smart phones are becoming very common and they are
laced with a number of sensors that can not only be used in native applications
but can also be sent to external nodes to be used by third parties for
application and service development
Comparative Analysis of Cryptography Library in IoT
The paper aims to do a survey along with a comparative analysis of the
various cryptography libraries that are applicable in the field of Internet of
Things (IoT). The first half of the paper briefly introduces the various
cryptography libraries available in the field of cryptography along with a list
of all the algorithms contained within the libraries. The second half of the
paper deals with cryptography libraries specifically aimed for application in
the field of Internet of Things. The various libraries and their performance
analysis listed down in this paper are consolidated from various sources with
the aim of providing a single comprehensive repository for reference to the
various cryptography libraries and the comparative analysis of their features
in IoT.Comment: 5 pages, 14 table
A novel secure routing scheme using probabilistic modelling for better resistivity against lethal attacks
Study towards Wireless Adhoc Network dates two decades back with various researchers evolving up with new solutions towards addressing its problems. Irrespective of various other problems, the issues related to the secure routing is yet unsolved owing to massively increasing fatal strategies of the adversary. Review of existing literature shows that the existing secure routing scheme can only govern over the stated attacks reducing the applicability in case of dynamic attacks. Therefore, this manuscript introduces a novel probabilistic model which offers the capability to wireless nodes to identify the malicious behavior and react accordingly. Different from existing intrusion prevention system, the proposed system allows the malicious node to participate in the data forwarding process and exhaust its resources with no chance of launching an attack. The simulated outcome of the study shows that the proposed secure routing scheme offers better data forwarding characteristic in contrast to the existing system in the aspect of intrusion detection and secure data transmission