Skip to main content

IoT Security Architecture with TEA for DoS Attacks Prevention

  • Conference paper
  • First Online:
Advances in Information Communication Technology and Computing

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 135))

Abstract

The Internet of Things (IoT) is important in now a day’s development of wireless networks enabling to acquire information from the environment, devices, and machines. A number of applications have been implemented in various kinds of technologies. IoT has high coverage to security attacks and threats. There are a number of requirements in terms of security. Confidentiality is one of the main concerns in the wireless network. Integrity and availability are key matters along with the confidentiality. This research focuses on identifying the DoS attacks that can occur in IoT. This paper uses Tiny Encryption Algorithm (TEA) to address these above mentioned security matters. From the algorithms, our proposed solutions can control DoS attack on IoT and any other networks of small devices.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Grabovica M, Popić S, Pezer D, Knežević V (2016) Provided security measures of enabling technologies in Internet of Things (IoT): a survey. Zooming Innovation in Cosr Elect Intnl Conf

    Google Scholar 

  2. Navarro M, Davis TW, Villalba G, Li Y, Zhong X, Erratt N (2014) Towards long-term multi-hop WSN deployments for environmental monitoring: an experimental network evaluation. JSAN 3:297–330

    Article  Google Scholar 

  3. Saha S, Matsumoto M (2007) A framework for disaster management system and WSN protocol for rescue operation. In: TENCON IEEE Conference, pp 1–4

    Google Scholar 

  4. Vaidehi V, Vardhini M, Yogeshwaran H, Inbasagar G, Bhargavi R, Hemalatha CS (2013) Agent based health monitoring of elderly people in indoor environments using wireless sensor networks. Procedia Comp Sci 19:64–71

    Article  Google Scholar 

  5. Xu R, Huang X, Zhang J, Lu Y, Wu G (2015) Software defined intelligent building. Int J Inf Secur Privacy (IJISP) 9(3):84–99

    Article  Google Scholar 

  6. Linlu L (2014) Comparative study on the development of internet of things policy in China and European Union Based. Sci Tech Info Dev Ec

    Google Scholar 

  7. Zhao K, Ge L (2013) A survey on the Internet of Things Security. In: ICCIS, pp 663–667

    Google Scholar 

  8. Alanazi S, Al-Muhtadi J, Derhab A, Saleem K (2015) On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications. In: ICENAS

    Google Scholar 

  9. Alanazi S, Al-Muhtadi J, Derhab A, Saleem K (2015) On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications. In: ICENAS

    Google Scholar 

  10. Atzori L, lera A, Morabito G (2010) The internet of thigs: a survey. Comp Netwks 54: 2787–2805

    Google Scholar 

  11. Katagi M, Moriai S (2008) Lightweight cryptography for the internet of things. Sony Corp 7–10

    Google Scholar 

  12. Ebrahim M, Khan S, Mohani SSUH (2014) Peer-to-peer network simulators: an analytical review

    Google Scholar 

  13. Ebrahim M, Khan S, Khalid UB (2014) Symmetric algorithm survey: a comparative analysis. IJCA 61(20):0975–8887

    Google Scholar 

  14. Lim CH, Korkishko T (2005) mcrypton–a lightweight block cipher for security of low-cost RFID tags and sensors. Info Sec App Springer, pp 243–258

    Google Scholar 

  15. Lim CH (1998) Crypton: a new 128-bit block cipher. In: NIST AEs Prop.

    Google Scholar 

  16. Engels D, Fan X, Gong G, Hu H, Smith EM (2009) Ultralight weight cryptography for low-cost RFID tags: Hummingbird algorithm and protocol. CACR Tech Rpts 29

    Google Scholar 

  17. Engels D, Saarinen MJO, Schweitzer P, Smith EM (2011) The hummingbird-2 lightweight authenticated encryption algorithm. RFID Sec. & Privacy. Springer, pp 19–31

    Google Scholar 

  18. Zhang K, Ding L, Guan J (2012) Cryptanalysis of hummingbird-2. IACR Crypt. ePrint Arc., vol 2012, p 207

    Google Scholar 

  19. Ganesan P, Venugopalan R, Peddabachagari P, Dean A, Mueller F, Sichitiu M (2003) Analyzing and modeling encryption overhead for sensor network nodes. In: Proceedings of the 2nd ICWSNA. ACM, pp 151–159

    Google Scholar 

  20. Schneier B (2007) Applied cryptography: protocols, algorithms, and source code in C. Wiley

    Google Scholar 

  21. Lai X (1992) On the design and security of block ciphers. Ph.D. diss., Diss. Techn. Wiss ETH Z¨urich, Nr. 9752, 1992. Ref.: Massey JL, Korref, uhlmann HB

    Google Scholar 

  22. https://www.concise-courses.com/5-major-types-of-dos-attack/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vishal Sharma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sharma, V., Sharma, A. (2021). IoT Security Architecture with TEA for DoS Attacks Prevention. In: Goar, V., Kuri, M., Kumar, R., Senjyu, T. (eds) Advances in Information Communication Technology and Computing. Lecture Notes in Networks and Systems, vol 135. Springer, Singapore. https://doi.org/10.1007/978-981-15-5421-6_22

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-5421-6_22

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-5420-9

  • Online ISBN: 978-981-15-5421-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics