Research Paper | Computer Science & Engineering | India | Volume 5 Issue 7, July 2016
Study of Secure Fault Tolerant Routing Protocol for IoT
Chaithra.S, Gowrishankar S
Abstract: IoT enables ubiquitous communication with different devices in a wireless network. Providing integrity, confidentiality and availability of services to access and authorization are the main challenges in IoT. For a successful communication process the path has to be established even in the presence of faults. In order to facilitate these issues the solution has to be proposed for data security assessment and penetration. In this paper RPL is used to achieve secure fault tolerant routing to enhance the performance and minimize the energy consumption. The Dijkstras algorithm is adopted to select the paths with low cost and to store the routing information. The proposed architecture includes a Blowfish algorithm method for secure data transmission. The performance analysis of RPL is done on the basis of Packet delivery ratio and energy consumption.
Keywords: IoT, Dijkstras Algorithm, RPL, Blowfish Algorithm
Edition: Volume 5 Issue 7, July 2016,
Pages: 1833 - 1838
How to Cite this Article?
Chaithra.S, Gowrishankar S, "Study of Secure Fault Tolerant Routing Protocol for IoT", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=NOV163879, Volume 5 Issue 7, July 2016, 1833 - 1838
How to Share this Article?
Similar Articles with Keyword 'IoT'
Real World IoT Applications in Daily Domain
Eega Vivek Reddy, J Bala Krishna, Huzaifa Saad
Review on Deep Learning and IoT Techniques on Corono Virus
Similar Articles with Keyword 'Dijkstras Algorithm'
Energy Saving Based Routing Algorithms in SDN Environment
Dr. Mohammed Najm Abdulla, Bassam Noori Shaker
Multi-hop Adaptive Link State Optimal Routing in Wireless Ad hoc Network
Nayan S. Jambhulkar, H. A. Hingoliwala
Similar Articles with Keyword 'RPL'
Incremental CFP-Tree Optimization For Efficient Representative Pattern Set Mining
Vivek Satpute, Prof. Digambar Padulkar
Chronological Comparison for Organizing Summaries of Content Anatomy
A. Geetha Vani, B. Naresh Achari
Similar Articles with Keyword 'Blowfish Algorithm'
Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
A Survey on Securing IOT Based Devices Using Cryptanalysis