Abstract
The Internet of Things (IoT) is important in now a day’s development of wireless networks enabling to acquire information from the environment, devices, and machines. A number of applications have been implemented in various kinds of technologies. IoT has high coverage to security attacks and threats. There are a number of requirements in terms of security. Confidentiality is one of the main concerns in the wireless network. Integrity and availability are key matters along with the confidentiality. This research focuses on identifying the DoS attacks that can occur in IoT. This paper uses Tiny Encryption Algorithm (TEA) to address these above mentioned security matters. From the algorithms, our proposed solutions can control DoS attack on IoT and any other networks of small devices.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Grabovica M, Popić S, Pezer D, Knežević V (2016) Provided security measures of enabling technologies in Internet of Things (IoT): a survey. Zooming Innovation in Cosr Elect Intnl Conf
Navarro M, Davis TW, Villalba G, Li Y, Zhong X, Erratt N (2014) Towards long-term multi-hop WSN deployments for environmental monitoring: an experimental network evaluation. JSAN 3:297–330
Saha S, Matsumoto M (2007) A framework for disaster management system and WSN protocol for rescue operation. In: TENCON IEEE Conference, pp 1–4
Vaidehi V, Vardhini M, Yogeshwaran H, Inbasagar G, Bhargavi R, Hemalatha CS (2013) Agent based health monitoring of elderly people in indoor environments using wireless sensor networks. Procedia Comp Sci 19:64–71
Xu R, Huang X, Zhang J, Lu Y, Wu G (2015) Software defined intelligent building. Int J Inf Secur Privacy (IJISP) 9(3):84–99
Linlu L (2014) Comparative study on the development of internet of things policy in China and European Union Based. Sci Tech Info Dev Ec
Zhao K, Ge L (2013) A survey on the Internet of Things Security. In: ICCIS, pp 663–667
Alanazi S, Al-Muhtadi J, Derhab A, Saleem K (2015) On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications. In: ICENAS
Alanazi S, Al-Muhtadi J, Derhab A, Saleem K (2015) On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications. In: ICENAS
Atzori L, lera A, Morabito G (2010) The internet of thigs: a survey. Comp Netwks 54: 2787–2805
Katagi M, Moriai S (2008) Lightweight cryptography for the internet of things. Sony Corp 7–10
Ebrahim M, Khan S, Mohani SSUH (2014) Peer-to-peer network simulators: an analytical review
Ebrahim M, Khan S, Khalid UB (2014) Symmetric algorithm survey: a comparative analysis. IJCA 61(20):0975–8887
Lim CH, Korkishko T (2005) mcrypton–a lightweight block cipher for security of low-cost RFID tags and sensors. Info Sec App Springer, pp 243–258
Lim CH (1998) Crypton: a new 128-bit block cipher. In: NIST AEs Prop.
Engels D, Fan X, Gong G, Hu H, Smith EM (2009) Ultralight weight cryptography for low-cost RFID tags: Hummingbird algorithm and protocol. CACR Tech Rpts 29
Engels D, Saarinen MJO, Schweitzer P, Smith EM (2011) The hummingbird-2 lightweight authenticated encryption algorithm. RFID Sec. & Privacy. Springer, pp 19–31
Zhang K, Ding L, Guan J (2012) Cryptanalysis of hummingbird-2. IACR Crypt. ePrint Arc., vol 2012, p 207
Ganesan P, Venugopalan R, Peddabachagari P, Dean A, Mueller F, Sichitiu M (2003) Analyzing and modeling encryption overhead for sensor network nodes. In: Proceedings of the 2nd ICWSNA. ACM, pp 151–159
Schneier B (2007) Applied cryptography: protocols, algorithms, and source code in C. Wiley
Lai X (1992) On the design and security of block ciphers. Ph.D. diss., Diss. Techn. Wiss ETH Z¨urich, Nr. 9752, 1992. Ref.: Massey JL, Korref, uhlmann HB
https://www.concise-courses.com/5-major-types-of-dos-attack/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sharma, V., Sharma, A. (2021). IoT Security Architecture with TEA for DoS Attacks Prevention. In: Goar, V., Kuri, M., Kumar, R., Senjyu, T. (eds) Advances in Information Communication Technology and Computing. Lecture Notes in Networks and Systems, vol 135. Springer, Singapore. https://doi.org/10.1007/978-981-15-5421-6_22
Download citation
DOI: https://doi.org/10.1007/978-981-15-5421-6_22
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-5420-9
Online ISBN: 978-981-15-5421-6
eBook Packages: EngineeringEngineering (R0)