IDEAS home Printed from https://ideas.repec.org/a/igg/jsda00/v11y2022i2p1-21.html
   My bibliography  Save this article

Multi-Layer and Clustering-Based Security Implementation for an IoT Environment

Author

Listed:
  • Deena Nath Gupta

    (Jamia Millia Islamia, India)

  • Rajendra Kumar

    (Jamia Millia Islamia, India)

Abstract

IoT devices are having many constraints related to computation power and memory etc. Many existing cryptographic algorithms of security could not work with IoT devices because of these constraints. Since the sensors are used in large amount to collect the relevant data in an IoT environment, and different sensor devices transmit these data as useful information, the first thing needs to be secure is the identity of devices. The second most important thing is the reliable information transmission between a sensor node and a sink node. While designing the cryptographic method in the IoT environment, programmers need to keep in mind the power limitation of the constraint devices. Mutual authentication between devices and encryption-decryption of messages need some sort of secure key. In the proposed cryptographic environment, there will be a hierarchical clustering, and devices will get registered by the authentication center at the time they enter the cluster. The devices will get mutually authenticated before initiating any conversation and will have to follow the public key protocol.

Suggested Citation

  • Deena Nath Gupta & Rajendra Kumar, 2022. "Multi-Layer and Clustering-Based Security Implementation for an IoT Environment," International Journal of System Dynamics Applications (IJSDA), IGI Global, vol. 11(2), pages 1-21, August.
  • Handle: RePEc:igg:jsda00:v:11:y:2022:i:2:p:1-21
    as

    Download full text from publisher

    File URL: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJSDA.20220701.oa3
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Asmeret Bier Naugle & Austin Silva & Munaf Aamir, 2017. "Cooperation and Free Riding in Cyber Security Information-Sharing Programs," International Journal of System Dynamics Applications (IJSDA), IGI Global, vol. 6(2), pages 71-85, April.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.

      More about this item

      Statistics

      Access and download statistics

      Corrections

      All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jsda00:v:11:y:2022:i:2:p:1-21. See general information about how to correct material in RePEc.

      If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

      If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

      If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

      For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .

      Please note that corrections may take a couple of weeks to filter through the various RePEc services.

      IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.