Loading

Secure and Authenticated Naming Scheme for IoT Devices in Heterogeneous Networks
Tamizh selvan. C1, V. Vijayalkshmi2

1Tamizhselvan. C, Research Scholar, Department of ECE, Pondicherry Engineering College, Puducherry, India.
2Dr. V. Vijayalakshmi, Associate Professor, Department of ECE, Pondicherry Engineering College, Puducherry, India. 

Manuscript received on 08 August 2019 | Revised Manuscript received on 15 August 2019 | Manuscript published on 30 August 2019 | PP: 3815-3820 | Volume-8 Issue-10, August 2019 | Retrieval Number: J99890881019/2019©BEIESP | DOI: 10.35940/ijitee.J9989.0881019
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Naming the device is the main challenge in IoT and getting authentication from the sensors is possible only with secured naming services. Naming a form of addressing the sensor nodes should be readable or understandable by humans or M2M communications. Existing naming schemes have scalability and security limitations. Hence, this paper proposes an efficient and secure distributed naming scheme for IoT in heterogeneous network. Hyper -Elliptic Curve Diffie – Hellman Key Exchange (HECDH) is used in the naming scheme for the exchange of keys. This technique reduces the communication and computation complexity. The heterogeneous model of the proposed technique is simulated and the analysis has been carried out. Digital Signature (i.e., Private Key) is used to verify the node authencity. Monitoring of the node in the network is implemented using IP based Position monitoring and Intruder Detection system (IDS) is implemented for detecting the attacks. The performance metrics such Energy consumption, PDR, Total Traffic, Delay, Average Response Time and Throughput of the proposed model was simulated using Contiki / Cooja version 2.7 simulator.
Keywords: DIstrubed NAming Scheme (DINAS), Naming, Attacks,  HECDH, IDS

Scope of the Article: IoT