TY - JOUR
T1 - Creating Security Modelling Framework Analysing in Internet of Things Using EC-GSM-IoT
T2 - Creating Security Modelling Framework Analysing in Internet of Things Using EC-GSM-IoT(Arabian Journal for Science and Engineering, (2023), 48, (2607))
AU - Selvaraj, Rajalakshmi
AU - Kuthadi, Venu Madhav
AU - Baskar, S.
AU - Shakeel, P. Mohamed
AU - Ranjan, Abhishek
N1 - Publisher Copyright:
© 2021, King Fahd University of Petroleum & Minerals.
PY - 2021/6/29
Y1 - 2021/6/29
N2 - Internet of Things (IoT) placed a vital role in making effective communication because it consists of several interconnected smart devices. In IoT, device communication started via different communication protocols like Wi-Fi, ZigBee. During the communication process, smart devices are affected by intermediate attacks, which causes several communication vulnerabilities. Therefore, successful communication protocols have to be developed to reduce intermediate attacks like insider attacks, DDoS. To achieve this goal in this work, Extended Coverage-GSM-IoT protocol has been integrated with the wide-mouth frog protocol for making the secure communication process. This protocol improves the overall IoT device integrity protocol and enables mutual authentication while making the communication process. The WMFP protocol validates the user identity that leads to reduce the replay and eavesdropping attacks. Thus, the process ensures a feasible and secure IoT communication environment with minimum complexity.
AB - Internet of Things (IoT) placed a vital role in making effective communication because it consists of several interconnected smart devices. In IoT, device communication started via different communication protocols like Wi-Fi, ZigBee. During the communication process, smart devices are affected by intermediate attacks, which causes several communication vulnerabilities. Therefore, successful communication protocols have to be developed to reduce intermediate attacks like insider attacks, DDoS. To achieve this goal in this work, Extended Coverage-GSM-IoT protocol has been integrated with the wide-mouth frog protocol for making the secure communication process. This protocol improves the overall IoT device integrity protocol and enables mutual authentication while making the communication process. The WMFP protocol validates the user identity that leads to reduce the replay and eavesdropping attacks. Thus, the process ensures a feasible and secure IoT communication environment with minimum complexity.
UR - http://www.scopus.com/inward/record.url?scp=85109158724&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85109158724&partnerID=8YFLogxK
U2 - 10.1007/s13369-021-05887-y
DO - 10.1007/s13369-021-05887-y
M3 - Article
AN - SCOPUS:85109158724
SN - 2193-567X
VL - 48
SP - 2607
JO - Arabian Journal for Science and Engineering
JF - Arabian Journal for Science and Engineering
IS - 2
ER -