Host Identity Protocol for End-to-End Security in IoT
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 132 , Downloads: 120 | CTR: 91 % | Weekly Popularity: ⮙2

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 10, October 2016

Host Identity Protocol for End-to-End Security in IoT

Huda Mulani, Aruna Gawade

This document aims to provide secure authentication of hosts using Host Identity Protocol. The impact and occurrence of Denial of service attacks and Man in middle attacks are tried to overcome and minimized. Furthermore, the various limitations in the HIP protocol are addressed here. The packet loss, network congestion, replay attack, packet flooding and spoofing are major considerations of HIP protocol are aimed to overcome.

Keywords: Internet of Things IoT, Wireless Sensor Networks, Host Identity Protocol, Multihoming and Mobility, HIP Base Exchange, Man in Middle

Edition: Volume 5 Issue 10, October 2016

Pages: 1316 - 1319

Share this Article

How to Cite this Article?

Huda Mulani, Aruna Gawade, "Host Identity Protocol for End-to-End Security in IoT", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20162461, Volume 5 Issue 10, October 2016, 1316 - 1319

132 PDF Views | 120 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Wireless Sensor Networks'

Views: 227 , Downloads: 150 | CTR: 66 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Views: 98 , Downloads: 68 | CTR: 69 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1317 - 1319

A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN

Chaitanya Sharma

Share this Article

Views: 170 , Downloads: 93 | CTR: 55 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Views: 125 , Downloads: 94 | CTR: 75 % | Weekly Popularity: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 3170 - 3173

Wireless Sensor Networks for Traffic Congestion Monitoring

Nitish R Chavan, Ravinarayana.B, Ravikumar.D

Share this Article

Views: 126 , Downloads: 99 | CTR: 79 %

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2727 - 2729

Improving WSN Lifetime Using Q-Routing Technique

Alphy Joseph, Shameela Sulaiman

Share this Article
Top