International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 123

Research Paper | Computer Science & Engineering | Iraq | Volume 8 Issue 8, August 2019


New Technique for Internet of Things Security based on the Hybrid Mcrypton - Blowfish and Chaotic System

Haider K. Hoomod [6] | Ahmed A. Ali [3]


Abstract: Internet of Things is a topic of much interest and, in last few year as one of the main focuses, links various kinds of devices to the Internet and even exchanges its data. The advent of IoT which has vast amount of connected devices enables us to monitor and control of real world and changes our daily lifestyle never available before. An important need to protect the data transferred from the devices of the user (mobile devices) and devices control things over the Internet. In this paper we propose a mechanism based on an algorithm that combines two algorithms to solve the problem of security in data transmission. We used a mobile phone to control and send signals to the raspberry pi, Which in turn controls and related devices that run in smart home


Keywords: internet of things security, blowfish, mcrypton, chaos


Edition: Volume 8 Issue 8, August 2019,


Pages: 650 - 652


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Haider K. Hoomod, Ahmed A. Ali, "New Technique for Internet of Things Security based on the Hybrid Mcrypton - Blowfish and Chaotic System", International Journal of Science and Research (IJSR), Volume 8 Issue 8, August 2019, pp. 650-652, https://www.ijsr.net/get_abstract.php?paper_id=ART202063

Similar Articles with Keyword 'blowfish'

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari | Neha Parmar

Share this Article

Downloads: 109

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1844 - 1847

A Providing Security on Cloud Data Hadoop using Symmetric Encryption and Identity Authentication

Kale Rohitkumar Bhausaheb | R.L.Paikrao

Share this Article
Top