International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Survey Paper | Computer Science & Engineering | India | Volume 9 Issue 7, July 2020

A Survey on Securing IOT Based Devices Using Cryptanalysis

Saumya Priya

With the advancement of technologies in last few decades, the need and use of IOT devices has been increasing drastically. Internet of Things (IOT) refers to the physical devices around the globe that are connected over the internet that helps us to share the data conveniently and accurately. The main components of any IOT device are sensor, actuator and computer devices which are attached to a particular object that is connected to internet and helps in transfer of data from source to destination. There is no denying the fact that IOT devices play vital role in providing a good quality of life but at the same time it is very important to provide security to an IOT device such that our confidential information cannot be hacked. In this research paper, we will see various cryptographic algorithms that provide security to IOT devices in order to protect it from security attacks.

Keywords: IOT, security attacks, cryptography, SIT algorithm, IDEA algorithm, blowfish algorithm, RSA algorithm

Edition: Volume 9 Issue 7, July 2020

Pages: 356 - 358

Share this Article

How to Cite this Article?

Saumya Priya, "A Survey on Securing IOT Based Devices Using Cryptanalysis", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SR20531194229, Volume 9 Issue 7, July 2020, 356 - 358

23 PDF Views | 26 PDF Downloads

Download Article PDF

Similar Articles with Keyword 'IOT'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 6, June 2020

Pages: 901 - 905

Low Latency Placement for Effective Fog based Infrastructure

Dr. Varsha Jotwani

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 356 - 358

A Survey on Securing IOT Based Devices Using Cryptanalysis

Saumya Priya

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1833 - 1838

Study of Secure Fault Tolerant Routing Protocol for IoT

Chaithra.S, Gowrishankar S

Share this Article

Comparative Studies, Computer Science & Engineering, India, Volume 7 Issue 9, September 2018

Pages: 1312 - 1314

A Comparison of Streaming Sensory Data Transfer Methods in Remote Processing Environment

Arush Nagpal, Prashant Singh Rana

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1645 - 1649

Generic Communication Framework for Internet of Things

Amol Dande, S. K. Pathan

Share this Article

Similar Articles with Keyword 'security attacks'

Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 356 - 358

A Survey on Securing IOT Based Devices Using Cryptanalysis

Saumya Priya

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1944 - 1949

A Review of Privacy Protection of Cloud Storage and Steganography Techniques

Alok Ranjan, Mansi Bhonsle

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2214 - 2220

A Comprehensive Survey on: Quantum Cryptography

Pranav Verma, Ritika Lohiya

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1565 - 1567

A Region Boundaries Algorithm for Ear Authentication Based on Plots

G. Harsha Vardhan, K. Jeeva

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2203 - 2208

Review on MANETs Characteristics, Challenges, Application and Security Attacks

Anuj Rana, Sandeep Gupta

Share this Article

Similar Articles with Keyword 'cryptography'

Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 356 - 358

A Survey on Securing IOT Based Devices Using Cryptanalysis

Saumya Priya

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3262 - 3267

An Image Database Security Using Multilayer Multi Share Visual Cryptography

Apurva A. Mohod, Prof. Komal B. Bijwe

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2927 - 2930

Incorporating Google Cloud Based Pub/Sub in Implementation of Identity Concentrated Encryption

Shilpashree K S, Harshavardhan L

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 842 - 846

An Efficient Technique of Steganography

Latika, Yogita Gulati

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2535 - 2538

A Survey on Security Mechanism using Colors and Armstrong Numbers

Nutan Gurav, Pratap Singh

Share this Article

Similar Articles with Keyword 'IDEA algorithm'

Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 356 - 358

A Survey on Securing IOT Based Devices Using Cryptanalysis

Saumya Priya

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 2224 - 2226

Crypt Analyzing of Message Digest Algorithms MD5 Using Quadratic Salt

Pradeep Singh Solanki, Vinit Agarwal

Share this Article

Similar Articles with Keyword 'blowfish algorithm'

Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 356 - 358

A Survey on Securing IOT Based Devices Using Cryptanalysis

Saumya Priya

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1833 - 1838

Study of Secure Fault Tolerant Routing Protocol for IoT

Chaithra.S, Gowrishankar S

Share this Article

Research Paper, Computer Science & Engineering, Iraq, Volume 3 Issue 7, July 2014

Pages: 336 - 343

Color Image Encryption and Decryption Based Pixel Shuffling with 3D Blowfish Algorithm

Asia Mahdi Naser Alzubaidi, Noor Dhia Kadhm Al-Shakarchy

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1289 - 1291

Cryptography in Image Using Blowfish Algorithm

S. S. Sudha, S. Divya

Share this Article

Similar Articles with Keyword 'RSA algorithm'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1681 - 1685

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage

Pranita Bakka, Dr. Jayashree Agarkhed

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 356 - 358

A Survey on Securing IOT Based Devices Using Cryptanalysis

Saumya Priya

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2067 - 2072

Review Paper on Secure Data Packet Transmission in Cluster Head and Base Station Using Wireless Sensor Network

Ashutosh S. Patil, Prof. Akhilesh A. Tyade

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 9, September 2013

Pages: 279 - 283

A New Design of Algorithm for Enhancing Security in Bluetooth Communication with Triple DES

B. Parsharamulu, R. V. Krishnaiah

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 298 - 302

Enhancing Security of Personal Health Records in Cloud Computing by Encryption

Nishitha Ramakrishnan, Sreerekha B

Share this Article



Top