International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 122

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 10, October 2016


Host Identity Protocol for End-to-End Security in IoT

Huda Mulani | Aruna Gawade [2]


Abstract: This document aims to provide secure authentication of hosts using Host Identity Protocol. The impact and occurrence of Denial of service attacks and Man in middle attacks are tried to overcome and minimized. Furthermore, the various limitations in the HIP protocol are addressed here. The packet loss, network congestion, replay attack, packet flooding and spoofing are major considerations of HIP protocol are aimed to overcome.


Keywords: Internet of Things IoT, Wireless Sensor Networks, Host Identity Protocol, Multihoming and Mobility, HIP Base Exchange, Man in Middle


Edition: Volume 5 Issue 10, October 2016,


Pages: 1316 - 1319


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Huda Mulani, Aruna Gawade, "Host Identity Protocol for End-to-End Security in IoT", International Journal of Science and Research (IJSR), Volume 5 Issue 10, October 2016, pp. 1316-1319, https://www.ijsr.net/get_abstract.php?paper_id=ART20162461

Similar Articles with Keyword 'Wireless Sensor Networks'

Downloads: 160 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri | S. K. Srivatsa [4]

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article
Top