{"title":"提高STOMP协议的安全性及其与其他加密方法的比较","authors":"Sarita Kumari, Sangeeta Gulia, Vikas Raman, Thirupathi J","doi":"10.1109/SSTEPS57475.2022.00077","DOIUrl":null,"url":null,"abstract":"Internet is seeming to be a vital need for each and every person in today’s world, by which the inter-connectivity also comes into scenario. As a result of this new innovation which is created using Internet covers the whole market. Then IoT (Internet of Things) arise and which helps to connect device and human being for various purposes. Here the gadget contains various kind of sensors and power sources, and all devices and human being can communicate each other for single or multiple tasks. Today IoT discover devices are works over the Cloud, so there is a need for security arises. Instead of which anywhere and anyone can access and misuse that information. Also the unauthorized person able to see and change the structure of architecture. In this paper we will discuss various types of message passing protocols used with IoT for transferring confidential information. Here we try to upgrade level of security while works with IoT and to build a secure end to end connectivity between devices.","PeriodicalId":289933,"journal":{"name":"2022 International Conference on Smart and Sustainable Technologies in Energy and Power Sectors (SSTEPS)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Enhancing the Security of STOMP Protocol and Its Comparison with other Encryption Methodologies\",\"authors\":\"Sarita Kumari, Sangeeta Gulia, Vikas Raman, Thirupathi J\",\"doi\":\"10.1109/SSTEPS57475.2022.00077\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Internet is seeming to be a vital need for each and every person in today’s world, by which the inter-connectivity also comes into scenario. As a result of this new innovation which is created using Internet covers the whole market. Then IoT (Internet of Things) arise and which helps to connect device and human being for various purposes. Here the gadget contains various kind of sensors and power sources, and all devices and human being can communicate each other for single or multiple tasks. Today IoT discover devices are works over the Cloud, so there is a need for security arises. Instead of which anywhere and anyone can access and misuse that information. Also the unauthorized person able to see and change the structure of architecture. In this paper we will discuss various types of message passing protocols used with IoT for transferring confidential information. Here we try to upgrade level of security while works with IoT and to build a secure end to end connectivity between devices.\",\"PeriodicalId\":289933,\"journal\":{\"name\":\"2022 International Conference on Smart and Sustainable Technologies in Energy and Power Sectors (SSTEPS)\",\"volume\":\"92 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Smart and Sustainable Technologies in Energy and Power Sectors (SSTEPS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SSTEPS57475.2022.00077\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Smart and Sustainable Technologies in Energy and Power Sectors (SSTEPS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SSTEPS57475.2022.00077","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Enhancing the Security of STOMP Protocol and Its Comparison with other Encryption Methodologies
Internet is seeming to be a vital need for each and every person in today’s world, by which the inter-connectivity also comes into scenario. As a result of this new innovation which is created using Internet covers the whole market. Then IoT (Internet of Things) arise and which helps to connect device and human being for various purposes. Here the gadget contains various kind of sensors and power sources, and all devices and human being can communicate each other for single or multiple tasks. Today IoT discover devices are works over the Cloud, so there is a need for security arises. Instead of which anywhere and anyone can access and misuse that information. Also the unauthorized person able to see and change the structure of architecture. In this paper we will discuss various types of message passing protocols used with IoT for transferring confidential information. Here we try to upgrade level of security while works with IoT and to build a secure end to end connectivity between devices.