Skip to main content

A Survey on Securing Smart Gadgets Using Lightweight Cryptography

  • Conference paper
  • First Online:
Proceedings of International Conference on Wireless Communication

Abstract

Current security world having big security challenges of IoT devices such as baby monitoring cameras. These devices are susceptible to any cyberattacks. Manufactures also not bother about security issues but it makes lightweight cryptography and wireless network security highly vulnerable. Rather to control over any computer, it is easy to attack such lightweight devices and use it for monitoring the personal activity or conduct DoS attack. Now different malwares are used to infect baby monitoring camera and exploit vulnerabilities. Through this study, we are going to focus on baby monitoring camera which is more vulnerable with respect to personal and commercial security breaching. We are proposing solution for lightweight cryptographic algorithm to secure default password and data storage in baby monitoring camera. DDoS attack happened because of looping in network so we are proposing solution for avoiding looping in network traffic that is implementation of spanning tree algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Hallman R, Bryan J, Palavicini Jr G, Divita J, Romero-Mariona J (2017) “IoDDoS” The internet of distributed denial of service attacks: a case study of the Mirai Malware and IoT-Based Botnets. https://doi.org/10.5220/0006246600470058

  2. Antonakakis M, April T, Bailey M, Bernhard M (2017) Understanding the Mirai Botnet. Akamai Technologies, Cloudflare, Georgia Institute of Technology, Google, Merit Network, University of Illinois Urbana-Champaign, University of Michigan. In: 26th USENIX security symposium, Vancouver, BC, Canada, 16–18 Aug 2017. ISBN 978-1-931971-40-9

    Google Scholar 

  3. Singh S, Sharma PK, Moon SY, Park JH (2017) Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. Springer

    Google Scholar 

  4. Chaabouni N, Mosbah M, Zemmari A, Sauvignac C, Faruki P Network intrusion detection for IoT security based on learning techniques. In: IEEE communications surveys & tutorials. https://doi.org/10.1109/comst.2019.2896380

    Article  Google Scholar 

  5. Bogdanov A, Knudsen LR, Leander G, Paar C, Poschmann A, Robshaw MJB, Seurin Y, Vikkelsoe C (2007) PRESENT: an ultra-lightweight block cipher, pp 450–466

    Google Scholar 

  6. McKay KA, Bassham L, Turan MS, Mouha N Report on lightweight cryptography

    Google Scholar 

  7. Banerjee S, Patil A (2018) ECC based encryption algorithm for lightweight cryptography. ISDA, Vellore

    Google Scholar 

  8. Chaitra B, Kiran Kumar VG, Shatharam Rai C (2017) A survey on lightweight cryptographic algorithms on FPGA, vol 12(1), Ver. II, pp 54–59. 2278–2834,p- ISSN: 2278-8735

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anita Patil .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Patil, A., Banerjee, S., Borkar, G. (2020). A Survey on Securing Smart Gadgets Using Lightweight Cryptography. In: Vasudevan, H., Gajic, Z., Deshmukh, A. (eds) Proceedings of International Conference on Wireless Communication . Lecture Notes on Data Engineering and Communications Technologies, vol 36. Springer, Singapore. https://doi.org/10.1007/978-981-15-1002-1_51

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-1002-1_51

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-1001-4

  • Online ISBN: 978-981-15-1002-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics