S. Thenmozhi, J. Bala Ranjitha, S. Anu, A. Jasmine soniya
{"title":"物联网轻量级安全框架","authors":"S. Thenmozhi, J. Bala Ranjitha, S. Anu, A. Jasmine soniya","doi":"10.1109/ICACCS.2019.8728414","DOIUrl":null,"url":null,"abstract":"IoT comprises a complex network of smart devices. This complex network consists of large number of nodes. The traditional cryptographic techniques do not provide solution for energy dissipation for IoT nodes. Hence measure should be taken to make sure that the data is secured and efficiently received at the receiving end. The RSSI values are used to generate fingerprints. At the server link fingerprints are matched to compute the correlation coefficient. The RSSI values are taken from offline database and simulation are performed in MATLAB. The data can be easily forged hence proper security must be taken. A single change in data might cause big problems. Hence to secure the data light-weight protocols are used.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Light Weight Security Framework for IoT\",\"authors\":\"S. Thenmozhi, J. Bala Ranjitha, S. Anu, A. Jasmine soniya\",\"doi\":\"10.1109/ICACCS.2019.8728414\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"IoT comprises a complex network of smart devices. This complex network consists of large number of nodes. The traditional cryptographic techniques do not provide solution for energy dissipation for IoT nodes. Hence measure should be taken to make sure that the data is secured and efficiently received at the receiving end. The RSSI values are used to generate fingerprints. At the server link fingerprints are matched to compute the correlation coefficient. The RSSI values are taken from offline database and simulation are performed in MATLAB. The data can be easily forged hence proper security must be taken. A single change in data might cause big problems. Hence to secure the data light-weight protocols are used.\",\"PeriodicalId\":249139,\"journal\":{\"name\":\"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)\",\"volume\":\"122 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICACCS.2019.8728414\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACCS.2019.8728414","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
IoT comprises a complex network of smart devices. This complex network consists of large number of nodes. The traditional cryptographic techniques do not provide solution for energy dissipation for IoT nodes. Hence measure should be taken to make sure that the data is secured and efficiently received at the receiving end. The RSSI values are used to generate fingerprints. At the server link fingerprints are matched to compute the correlation coefficient. The RSSI values are taken from offline database and simulation are performed in MATLAB. The data can be easily forged hence proper security must be taken. A single change in data might cause big problems. Hence to secure the data light-weight protocols are used.