当前位置: X-MOL 学术EURASIP J. Adv. Signal Process. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Secure and efficient transmission of data based on Caesar Cipher Algorithm for Sybil attack in IoT
EURASIP Journal on Advances in Signal Processing ( IF 1.7 ) Pub Date : 2021-07-16 , DOI: 10.1186/s13634-021-00748-0
Aditya Sai Srinivas Thuluva 1 , Manivannan Sorakaya Somanathan 2 , Ramasubbareddy Somula 3 , Sankar Sennan 4 , Daniel Burgos 5
Affiliation  

The Internet of Things (IoT) is an emerging concept in the field of information technology. IoT can integrate any real-time entity with another, using sensing, computing and communication capabilities to offer enhanced services in everyday life. In this article, IoT-based patient health monitoring is considered for use in IoT sensors deployed in devices. These devices are attached to the body of the patient for timely tracking of his or her health condition. During data transfers from devices connected to the patient’s body to the doctor, the data may be susceptible to security threats. IoT devices are subjected to many routing attacks, like blackhole, greyhole, Sybil, sinkhole and wormhole attacks. Sybil attacks are the most dangerous routing attacks. This type of attack involves stealing the identities of legitimate nodes; this, in turn, leads to information loss, misinterpretation in the network and an increase in routing disturbances. Hence, in this paper, we propose the use of the traditional Caesar Cipher Algorithm (CCA) along with the lightweight encryption algorithm (LEA) and the Received Signal Strength Indicator (RSSI) to detect and prevent Sybil attacks in an IoT environment. The proposed algorithm detects the false node in a particular path by announcing the attack to another node. It also prevents the attack by choosing an alternative path by which to forward data packets to the desired users. To ensure authentication, privacy and data integrity, the lightweight encryption algorithm with a 64-bit key is used with AODV as the routing protocol.



中文翻译:

基于凯撒密码算法的物联网女巫攻击数据安全高效传输

物联网 (IoT) 是信息技术领域的一个新兴概念。物联网可以将任何实时实体与另一个实体集成,使用传感、计算和通信功能在日常生活中提供增强的服务。在本文中,考虑将基于 IoT 的患者健康监测用于部署在设备中的 IoT 传感器。这些设备附着在患者的身体上,以便及时跟踪他或她的健康状况。在从连接到患者身体的设备到医生的数据传输过程中,数据可能容易受到安全威胁。物联网设备受到许多路由攻击,如黑洞、灰洞、女巫、天坑和虫洞攻击。Sybil 攻击是最危险的路由攻击。这种类型的攻击涉及窃取合法节点的身份;这反过来,导致信息丢失、网络中的误解和路由干扰的增加。因此,在本文中,我们建议使用传统的凯撒密码算法 (CCA) 以及轻量级加密算法 (LEA) 和接收信号强度指标 (RSSI) 来检测和防止物联网环境中的女巫攻击。所提出的算法通过向另一个节点宣布攻击来检测特定路径中的虚假节点。它还通过选择将数据包转发到所需用户的替代路径来防止攻击。为确保身份验证、隐私和数据完整性,AODV 使用具有 64 位密钥的轻量级加密算法作为路由协议。我们建议使用传统的凯撒密码算法 (CCA) 以及轻量级加密算法 (LEA) 和接收信号强度指标 (RSSI) 来检测和防止物联网环境中的女巫攻击。所提出的算法通过向另一个节点宣布攻击来检测特定路径中的虚假节点。它还通过选择将数据包转发到所需用户的替代路径来防止攻击。为确保身份验证、隐私和数据完整性,AODV 使用具有 64 位密钥的轻量级加密算法作为路由协议。我们建议使用传统的凯撒密码算法 (CCA) 以及轻量级加密算法 (LEA) 和接收信号强度指标 (RSSI) 来检测和防止物联网环境中的女巫攻击。所提出的算法通过向另一个节点宣布攻击来检测特定路径中的虚假节点。它还通过选择将数据包转发到所需用户的替代路径来防止攻击。为确保身份验证、隐私和数据完整性,AODV 使用具有 64 位密钥的轻量级加密算法作为路由协议。所提出的算法通过向另一个节点宣布攻击来检测特定路径中的虚假节点。它还通过选择将数据包转发到所需用户的替代路径来防止攻击。为确保身份验证、隐私和数据完整性,AODV 使用具有 64 位密钥的轻量级加密算法作为路由协议。所提出的算法通过向另一个节点宣布攻击来检测特定路径中的虚假节点。它还通过选择将数据包转发到所需用户的替代路径来防止攻击。为确保身份验证、隐私和数据完整性,AODV 使用具有 64 位密钥的轻量级加密算法作为路由协议。

更新日期:2021-07-16
down
wechat
bug