Creating Security Modelling Framework Analysing in Internet of Things Using EC-GSM-IoT: Creating Security Modelling Framework Analysing in Internet of Things Using EC-GSM-IoT(Arabian Journal for Science and Engineering, (2023), 48, (2607))

Rajalakshmi Selvaraj, Venu Madhav Kuthadi, S. Baskar, P. Mohamed Shakeel, Abhishek Ranjan

Research output: Contribution to journalArticlepeer-review

Abstract

Internet of Things (IoT) placed a vital role in making effective communication because it consists of several interconnected smart devices. In IoT, device communication started via different communication protocols like Wi-Fi, ZigBee. During the communication process, smart devices are affected by intermediate attacks, which causes several communication vulnerabilities. Therefore, successful communication protocols have to be developed to reduce intermediate attacks like insider attacks, DDoS. To achieve this goal in this work, Extended Coverage-GSM-IoT protocol has been integrated with the wide-mouth frog protocol for making the secure communication process. This protocol improves the overall IoT device integrity protocol and enables mutual authentication while making the communication process. The WMFP protocol validates the user identity that leads to reduce the replay and eavesdropping attacks. Thus, the process ensures a feasible and secure IoT communication environment with minimum complexity.

Original languageEnglish
Pages (from-to)2607
Number of pages13
JournalArabian Journal for Science and Engineering
Volume48
Issue number2
DOIs
Publication statusPublished - Jun 29 2021

All Science Journal Classification (ASJC) codes

  • General

Fingerprint

Dive into the research topics of 'Creating Security Modelling Framework Analysing in Internet of Things Using EC-GSM-IoT: Creating Security Modelling Framework Analysing in Internet of Things Using EC-GSM-IoT(Arabian Journal for Science and Engineering, (2023), 48, (2607))'. Together they form a unique fingerprint.

Cite this