Abstract
The Internet of Things (IoT) helps users in their day to day activities such that they can communicate with each other through sensors very easily and in less time. Communication through intermediate sensor nodes may violate security because it may harm confidential user data or information by either modifying it or not forwarding to it. To deal with such problems, a number of cryptographic secure mechanisms are available that provide symmetric and asymmetric keys to secure data and each mechanism has its own pros and cons. In this paper, a secure DES-based mechanism is proposed in which a DES algorithm is used to transfer the data between users through sensor nodes without no loss of security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Patel KK, Patel SM (2016). Internet of things-IOT: definition, characteristics, architecture, enabling technologies, application & future challenges
Ford S (2014) The internet’s next big idea: connecting people, information, and things
Cheng S, Cai Z, Li J (2015) Curve query processing in wireless sensor networks. IEEE Trans Veh Technol 64(11):5198–5209
Huang B, Yu J, Yu D, Ma C (2014) SINR based maximum link scheduling with uniform power in wireless sensor networks. KSII Trans Internet Inf Syst 8(11)
Hu C, Li H, Huo Y, Xiang T, Liao X (2016) Secure and efficient data communication protocol for wireless body area networks. IEEE Trans Multi-Scale Comput Syst 2(2):94–107
“Nest thermostat”. https://nest.com/thermostat/meet-nest-thermostat/
Vermesan O, Friess P (eds) (2013) Internet of things: converging technologies for smart environments and integrated ecosystems. River Publishers
Evans D (2011) The internet of things: how the next evolution of the internet is changing everything. White paper, Cisco Internet Business Solutions Group (IBSG)
Greenough J (2015) The ‘internet of things’ will be the world’s most massive device market and save companies billions of dollars. Available via Business Insider
Vermesan O, Friess P (eds) (2014) Internet of things-from research and innovation to market deployment, vol 29. River Publishers, Aalborg
Jie Y, Pei JY, Jun L, Yun G, Wei X (2013) Smart home system based on IoT technologies. In: 2013 fifth international conference on computational and information sciences (ICCIS). IEEE, pp 1789–1791
Wang M, Zhang G, Zhang C, Zhang J, Li C (2013) An IoT-based appliance control system for smart homes. In: 2013 fourth international conference on intelligent control and information processing (ICICIP). IEEE, pp 744–747
Song T, Li R, Mei B, Yu J, Xing X, Cheng X (2017) A privacy preserving communication protocol for IoT applications in smart homes. IEEE Internet Things J
Hu C, Cheng X, Zhang F, Wu D, Liao X, Chen D (2013) OPFKA: secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks. In: 2013 proceedings IEEE, INFOCOM. IEEE, pp 2274–2282
Naglic M, Souvent A (2013) Concept of smart home and smart grids integration. In: 2013 4th international youth conference on energy (IYCE). IEEE, pp 1–5
Fogli D, Lanzilotti R, Piccinno A, Tosi P (2016) AmI@Home: a game-based collaborative system for smart home configuration. In: Proceedings of the international working conference on advanced visual interfaces. ACM, pp 308–309
Li H, He Y, Sun L, Cheng X, Yu J (2016) Side-channel information leakage of encrypted video stream in video surveillance systems. In: 2016-the 35th annual IEEE international conference on computer communications, IEEE INFOCOM. IEEE, pp 1–9
Poslad S (2011) Ubiquitous computing: smart devices, environments and interactions. Wiley
Pantelopoulos A, Bourbakis NG (2010) A survey on wearable sensor-based systems for health monitoring and prognosis. IEEE Trans Syst Man, Cybern Part C Appl Rev 40(1):1–12
Sutherland IE (1968) A head-mounted three dimensional display. In: Proceedings of the fall joint computer conference, part I, 9–11 December 1968. ACM, pp 757–764
Miner CS, Chan DM, Campbell C (2001) Digital jewelry: wearable technology for everyday life. In: CHI’01 extended abstracts on human factors in computing systems. ACM, pp 45–46
Billinghurst M, Starner T (1999) Wearable devices: new ways to manage information. Computer 32(1):57–64
Spangler WS, Kreulen JT, Chen Y, Proctor L, Alba A, Lelescu A, Behal A (2010) A smarter process for sensing the information space. IBM J Res Dev 54(4):1–13
Klein C, Kaefer G (2008) From smart homes to smart cities: opportunities and challenges from an industrial perspective. In: International conference on next generation wired/wireless networking. Springer, Berlin, Heidelberg, pp 260–260
Yovanof GS, Hazapis GN (2009) An architectural framework and enabling wireless technologies for digital cities & intelligent urban environments. Wirel Pers Commun 49(3):445–463
Schonwalder J (2010) Internet of things: 802.15.4, 6LoWPAN, RPL, COAP. http://www.utwente.nl/ewi/dacs/Colloquium/archive/2010/slides/2010-utwente-6lowpan-rpl-coap.pdf. Last accessed, 10 April 2014
Gershenfeld N, Krikorian R, Cohen D (2004) Internet of things. Scientific American
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Chandi, P., Sharma, A., Chhabra, A., Gupta, P. (2019). A DES-Based Mechanism to Secure Personal Data on the Internet of Things. In: Kumar, A., Mozar, S. (eds) ICCCE 2018. ICCCE 2018. Lecture Notes in Electrical Engineering, vol 500. Springer, Singapore. https://doi.org/10.1007/978-981-13-0212-1_6
Download citation
DOI: https://doi.org/10.1007/978-981-13-0212-1_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-0211-4
Online ISBN: 978-981-13-0212-1
eBook Packages: EngineeringEngineering (R0)