Downloads: 122 | Views: 131
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 10, October 2016
Host Identity Protocol for End-to-End Security in IoT
Huda Mulani | Aruna Gawade [2]
Abstract: This document aims to provide secure authentication of hosts using Host Identity Protocol. The impact and occurrence of Denial of service attacks and Man in middle attacks are tried to overcome and minimized. Furthermore, the various limitations in the HIP protocol are addressed here. The packet loss, network congestion, replay attack, packet flooding and spoofing are major considerations of HIP protocol are aimed to overcome.
Keywords: Internet of Things IoT, Wireless Sensor Networks, Host Identity Protocol, Multihoming and Mobility, HIP Base Exchange, Man in Middle
Edition: Volume 5 Issue 10, October 2016,
Pages: 1316 - 1319
Similar Articles with Keyword 'Wireless Sensor Networks'
Downloads: 159 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 868 - 874Study of Power Management in Adhoc Networks
Anandhi Giri | S. K. Srivatsa [4]
Downloads: 1
Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021
Pages: 475 - 485Light Weight WSN Authentication Protocol Suite
Rahul K Drolia