Skip to main content

A DES-Based Mechanism to Secure Personal Data on the Internet of Things

  • Conference paper
  • First Online:
ICCCE 2018 (ICCCE 2018)

Abstract

The Internet of Things (IoT) helps users in their day to day activities such that they can communicate with each other through sensors very easily and in less time. Communication through intermediate sensor nodes may violate security because it may harm confidential user data or information by either modifying it or not forwarding to it. To deal with such problems, a number of cryptographic secure mechanisms are available that provide symmetric and asymmetric keys to secure data and each mechanism has its own pros and cons. In this paper, a secure DES-based mechanism is proposed in which a DES algorithm is used to transfer the data between users through sensor nodes without no loss of security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Patel KK, Patel SM (2016). Internet of things-IOT: definition, characteristics, architecture, enabling technologies, application & future challenges

    Google Scholar 

  2. Ford S (2014) The internet’s next big idea: connecting people, information, and things

    Google Scholar 

  3. Cheng S, Cai Z, Li J (2015) Curve query processing in wireless sensor networks. IEEE Trans Veh Technol 64(11):5198–5209

    Article  Google Scholar 

  4. Huang B, Yu J, Yu D, Ma C (2014) SINR based maximum link scheduling with uniform power in wireless sensor networks. KSII Trans Internet Inf Syst 8(11)

    Google Scholar 

  5. Hu C, Li H, Huo Y, Xiang T, Liao X (2016) Secure and efficient data communication protocol for wireless body area networks. IEEE Trans Multi-Scale Comput Syst 2(2):94–107

    Article  Google Scholar 

  6. “Nest thermostat”. https://nest.com/thermostat/meet-nest-thermostat/

  7. Vermesan O, Friess P (eds) (2013) Internet of things: converging technologies for smart environments and integrated ecosystems. River Publishers

    Google Scholar 

  8. Evans D (2011) The internet of things: how the next evolution of the internet is changing everything. White paper, Cisco Internet Business Solutions Group (IBSG)

    Google Scholar 

  9. Greenough J (2015) The ‘internet of things’ will be the world’s most massive device market and save companies billions of dollars. Available via Business Insider

    Google Scholar 

  10. Vermesan O, Friess P (eds) (2014) Internet of things-from research and innovation to market deployment, vol 29. River Publishers, Aalborg

    Google Scholar 

  11. Jie Y, Pei JY, Jun L, Yun G, Wei X (2013) Smart home system based on IoT technologies. In: 2013 fifth international conference on computational and information sciences (ICCIS). IEEE, pp 1789–1791

    Google Scholar 

  12. Wang M, Zhang G, Zhang C, Zhang J, Li C (2013) An IoT-based appliance control system for smart homes. In: 2013 fourth international conference on intelligent control and information processing (ICICIP). IEEE, pp 744–747

    Google Scholar 

  13. Song T, Li R, Mei B, Yu J, Xing X, Cheng X (2017) A privacy preserving communication protocol for IoT applications in smart homes. IEEE Internet Things J

    Google Scholar 

  14. Hu C, Cheng X, Zhang F, Wu D, Liao X, Chen D (2013) OPFKA: secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks. In: 2013 proceedings IEEE, INFOCOM. IEEE, pp 2274–2282

    Google Scholar 

  15. Naglic M, Souvent A (2013) Concept of smart home and smart grids integration. In: 2013 4th international youth conference on energy (IYCE). IEEE, pp 1–5

    Google Scholar 

  16. Fogli D, Lanzilotti R, Piccinno A, Tosi P (2016) AmI@Home: a game-based collaborative system for smart home configuration. In: Proceedings of the international working conference on advanced visual interfaces. ACM, pp 308–309

    Google Scholar 

  17. Li H, He Y, Sun L, Cheng X, Yu J (2016) Side-channel information leakage of encrypted video stream in video surveillance systems. In: 2016-the 35th annual IEEE international conference on computer communications, IEEE INFOCOM. IEEE, pp 1–9

    Google Scholar 

  18. Poslad S (2011) Ubiquitous computing: smart devices, environments and interactions. Wiley

    Google Scholar 

  19. Pantelopoulos A, Bourbakis NG (2010) A survey on wearable sensor-based systems for health monitoring and prognosis. IEEE Trans Syst Man, Cybern Part C Appl Rev 40(1):1–12

    Google Scholar 

  20. Sutherland IE (1968) A head-mounted three dimensional display. In: Proceedings of the fall joint computer conference, part I, 9–11 December 1968. ACM, pp 757–764

    Google Scholar 

  21. Miner CS, Chan DM, Campbell C (2001) Digital jewelry: wearable technology for everyday life. In: CHI’01 extended abstracts on human factors in computing systems. ACM, pp 45–46

    Google Scholar 

  22. Billinghurst M, Starner T (1999) Wearable devices: new ways to manage information. Computer 32(1):57–64

    Article  Google Scholar 

  23. Spangler WS, Kreulen JT, Chen Y, Proctor L, Alba A, Lelescu A, Behal A (2010) A smarter process for sensing the information space. IBM J Res Dev 54(4):1–13

    Article  Google Scholar 

  24. Klein C, Kaefer G (2008) From smart homes to smart cities: opportunities and challenges from an industrial perspective. In: International conference on next generation wired/wireless networking. Springer, Berlin, Heidelberg, pp 260–260

    Google Scholar 

  25. Yovanof GS, Hazapis GN (2009) An architectural framework and enabling wireless technologies for digital cities & intelligent urban environments. Wirel Pers Commun 49(3):445–463

    Article  Google Scholar 

  26. Schonwalder J (2010) Internet of things: 802.15.4, 6LoWPAN, RPL, COAP. http://www.utwente.nl/ewi/dacs/Colloquium/archive/2010/slides/2010-utwente-6lowpan-rpl-coap.pdf. Last accessed, 10 April 2014

  27. Gershenfeld N, Krikorian R, Cohen D (2004) Internet of things. Scientific American

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pragya Chandi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chandi, P., Sharma, A., Chhabra, A., Gupta, P. (2019). A DES-Based Mechanism to Secure Personal Data on the Internet of Things. In: Kumar, A., Mozar, S. (eds) ICCCE 2018. ICCCE 2018. Lecture Notes in Electrical Engineering, vol 500. Springer, Singapore. https://doi.org/10.1007/978-981-13-0212-1_6

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-0212-1_6

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-0211-4

  • Online ISBN: 978-981-13-0212-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics