International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 122

India | Computer Science Engineering | Volume 5 Issue 10, October 2016 | Pages: 1316 - 1319


Host Identity Protocol for End-to-End Security in IoT

Huda Mulani, Aruna Gawade

Abstract: This document aims to provide secure authentication of hosts using Host Identity Protocol. The impact and occurrence of Denial of service attacks and Man in middle attacks are tried to overcome and minimized. Furthermore, the various limitations in the HIP protocol are addressed here. The packet loss, network congestion, replay attack, packet flooding and spoofing are major considerations of HIP protocol are aimed to overcome.

Keywords: Internet of Things IoT, Wireless Sensor Networks, Host Identity Protocol, Multihoming and Mobility, HIP Base Exchange, Man in Middle



Citation copied to Clipboard!

Rate this Article

5

Characters: 0

Received Comments

No approved comments available.

Rating submitted successfully!


Top