{"title":"使用Diffie-Hellman、AES和MD5加密方案实现物联网设备节点到节点的安全数据通信","authors":"Kester Quist-Aphetsi, Michael Christopher Xenya","doi":"10.1109/ICSIoT47925.2019.00022","DOIUrl":null,"url":null,"abstract":"Identifying the right source and target nodes in IoT as well as secure data communication is very vital in ensuring security, validity and reliability of IoT communication. Since more devices are being programmed to exchange data and commands autonomously in IoT and wireless sensor networks, security and authenticity of such transmitted data is very crucial. This calls for strong security approaches to prevent both passive and active attackers against data communication. This work proposed a scheme for securing communication among IoT devices by applying Diffie-Hellman encryption algorithm to authenticate the communicating nodes while using AES and MD5 to encrypt and validate the data transfer among the nodes.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"47 3","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Node to Node Secure Data Communication for IoT Devices Using Diffie-Hellman, AES, and MD5 Cryptographic Schemes\",\"authors\":\"Kester Quist-Aphetsi, Michael Christopher Xenya\",\"doi\":\"10.1109/ICSIoT47925.2019.00022\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Identifying the right source and target nodes in IoT as well as secure data communication is very vital in ensuring security, validity and reliability of IoT communication. Since more devices are being programmed to exchange data and commands autonomously in IoT and wireless sensor networks, security and authenticity of such transmitted data is very crucial. This calls for strong security approaches to prevent both passive and active attackers against data communication. This work proposed a scheme for securing communication among IoT devices by applying Diffie-Hellman encryption algorithm to authenticate the communicating nodes while using AES and MD5 to encrypt and validate the data transfer among the nodes.\",\"PeriodicalId\":226799,\"journal\":{\"name\":\"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)\",\"volume\":\"47 3\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSIoT47925.2019.00022\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSIoT47925.2019.00022","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Node to Node Secure Data Communication for IoT Devices Using Diffie-Hellman, AES, and MD5 Cryptographic Schemes
Identifying the right source and target nodes in IoT as well as secure data communication is very vital in ensuring security, validity and reliability of IoT communication. Since more devices are being programmed to exchange data and commands autonomously in IoT and wireless sensor networks, security and authenticity of such transmitted data is very crucial. This calls for strong security approaches to prevent both passive and active attackers against data communication. This work proposed a scheme for securing communication among IoT devices by applying Diffie-Hellman encryption algorithm to authenticate the communicating nodes while using AES and MD5 to encrypt and validate the data transfer among the nodes.