International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064




Downloads: 122 | Views: 131

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 10, October 2016


Host Identity Protocol for End-to-End Security in IoT

Huda Mulani | Aruna Gawade [2]


Abstract: This document aims to provide secure authentication of hosts using Host Identity Protocol. The impact and occurrence of Denial of service attacks and Man in middle attacks are tried to overcome and minimized. Furthermore, the various limitations in the HIP protocol are addressed here. The packet loss, network congestion, replay attack, packet flooding and spoofing are major considerations of HIP protocol are aimed to overcome.


Keywords: Internet of Things IoT, Wireless Sensor Networks, Host Identity Protocol, Multihoming and Mobility, HIP Base Exchange, Man in Middle


Edition: Volume 5 Issue 10, October 2016,


Pages: 1316 - 1319


How to Download this Article?

Type Your Email Address below to Download the Article PDF


How to Cite this Article?

Huda Mulani, Aruna Gawade, "Host Identity Protocol for End-to-End Security in IoT", International Journal of Science and Research (IJSR), Volume 5 Issue 10, October 2016, pp. 1316-1319, https://www.ijsr.net/get_abstract.php?paper_id=ART20162461



Similar Articles with Keyword 'Wireless Sensor Networks'

Downloads: 159 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri | S. K. Srivatsa [4]

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article



Top