Views: 132 , Downloads: 120 | CTR: 91 % | Weekly Popularity: ⮙2
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 10, October 2016
Host Identity Protocol for End-to-End Security in IoT
Huda Mulani, Aruna Gawade
This document aims to provide secure authentication of hosts using Host Identity Protocol. The impact and occurrence of Denial of service attacks and Man in middle attacks are tried to overcome and minimized. Furthermore, the various limitations in the HIP protocol are addressed here. The packet loss, network congestion, replay attack, packet flooding and spoofing are major considerations of HIP protocol are aimed to overcome.
Keywords: Internet of Things IoT, Wireless Sensor Networks, Host Identity Protocol, Multihoming and Mobility, HIP Base Exchange, Man in Middle
Edition: Volume 5 Issue 10, October 2016
Pages: 1316 - 1319
How to Cite this Article?
Huda Mulani, Aruna Gawade, "Host Identity Protocol for End-to-End Security in IoT", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20162461, Volume 5 Issue 10, October 2016, 1316 - 1319
132 PDF Views | 120 PDF Downloads
Similar Articles with Keyword 'Wireless Sensor Networks'
Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN
Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Wireless Sensor Networks for Traffic Congestion Monitoring
Nitish R Chavan, Ravinarayana.B, Ravikumar.D
Improving WSN Lifetime Using Q-Routing Technique
Alphy Joseph, Shameela Sulaiman