Abstract
The Internet of Things (IoT) is an exploding market as well as an important focus area for research. Security is a major issue for IoT products and solutions, with several massive problems that are still commonplace in the field. In this paper, we have successfully minimized the risk of data eavesdropping and tampering over the network by securing these communications using the concept of tunneling. We have implemented this by connecting a router to the Internet via a virtual private network while using PPTP and L2TP as the underlying protocols for the VPN and exploring their cost benefits, compatibility and most importantly, their feasibility. The main purpose of our paper is to try to secure IoT networks without adversely affecting the selling point of IoT.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cisco Global Cloud Index: Forecast and Methodology, 2016–2021 White Paper, Nov 2018
Haroon, A., et al.: Constraints in the IoT: The World in 2020 and Beyond, pp. 1–2 (2016)
Zhang, J., et al.: Proximity based IoT device authentication. In: IEEE INFOCOM 2017-IEEE Conference on Computer Communications, IEEE, 2017
Sridhar, S., Smys, S.: Intelligent security framework for IoT devices cryptography based end-to-end security architecture. In: 2017 International Conference on Inventive Systems and Control (ICISC), IEEE, pp. 1–5, Jan 19 2017
Katagi, M., Moriai, S.: Lightweight Cryptography for the Internet of Things, pp. 2–4. Sony Corporation, 2008
Riahi, A., Challal, Y., Natalizio, E., Chtourou, Z., Bouabdallah, A.: A systemic approach for IoT security. In: Proceedings—IEEE International Conference on Distributed Computing in Sensor Systems, DCoSS 2013. pp. 351–355 (2013) https://doi.org/10.1109/dcoss.2013.78
Miklós, G., Harmatos, J.: Mobile layer 2 virtual private network over internet protocol networks. U.S. Patent No. 9,173,153. 27 Oct 2015
Nawir, M., et al.: Internet of things (IoT): Taxonomy of security attacks. In: 2016 3rd International Conference on Electronic Design (ICED), IEEE, 2016
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Lodha, I., Kolur, L., Hari, K.S., Honnavalli, P. (2020). Secure Wireless Internet of Things Communication Using Virtual Private Networks. In: Bindhu, V., Chen, J., Tavares, J. (eds) International Conference on Communication, Computing and Electronics Systems. Lecture Notes in Electrical Engineering, vol 637. Springer, Singapore. https://doi.org/10.1007/978-981-15-2612-1_70
Download citation
DOI: https://doi.org/10.1007/978-981-15-2612-1_70
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-2611-4
Online ISBN: 978-981-15-2612-1
eBook Packages: EngineeringEngineering (R0)