Abstract: The Internet of Things (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enable these things to connect and exchange data, creating opportunities for more direct integration of the physical world into computer-based systems, resulting in efficiency improvements, economic benefits, and reduced human exertions. In the proposed work, by-hop encryption technique is utilized within the traditional network layer in order to encrypt the information within the transmission process. However, with the help of decryption and encryption operations, there is a need to keep plain text within each node. There is end-to-end encryption mechanism applied within the traditional application layer. This means that for sender as well as receiver, the information is only kept explicit. There will always be encrypted information provided within the transmission process as well as during the forwarding of nodes. There is a need to select amongst by-hop and end-to-end encryption within IoT systems since network layer and application layer are connected so closely. Only the links that require protection can be encrypted in case when by-hop encryption is adopted. This is due to the reason that various applications can be implemented safely when this approach is applied to all business within the network layer. Thus, there is transparency of security mechanisms to business applications with the help of which it becomes convenient for end users to access services. The clocks of the IoT devices are not well synchronized due to which security of the network gets compromised. The work synchronizes clocks of the IoT devices and also establish secure channel from source to destination for data transmission. The work has been evaluated using various performance metrics; energy, throughput, packet loss and number of dead nodes. The proposed work leads to increased security of the network and reduced packet loss in the network.

Keywords: RSA, Time lay, clock synchronization, IOT, Security


PDF | DOI: 10.17148/IARJSET.2018.5716

Open chat