Please use this identifier to cite or link to this item:
http://hdl.handle.net/2080/2718
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Moharana, Soumya Ranjan | - |
dc.contributor.author | Addya, Sourav Kanti | - |
dc.contributor.author | Satpathy, Anurag | - |
dc.contributor.author | Turuk, Ashok Kumar | - |
dc.contributor.author | Majhi, Banshidhar | - |
dc.contributor.author | Jha, V K | - |
dc.date.accessioned | 2017-06-02T10:38:27Z | - |
dc.date.available | 2017-06-02T10:38:27Z | - |
dc.date.issued | 2017-05 | - |
dc.identifier.citation | 3rd International Conference on Sensing,Signal Processing and Security (ICSSS), St. Peter's College of Engineering and Technology, Chennai, Tamil Nadu, India, 4-5 May 2017 | en_US |
dc.identifier.uri | http://hdl.handle.net/2080/2718 | - |
dc.description | Copyright for this paper belongs to proceeding publisher | en_US |
dc.description.abstract | Internet of Things (IoT) cloud networks is itself a pervasive idea where all the physical objects are connected over the internet and are allocated with special self-identifying ability to discover other potential objects to transmit data over the internet. The most important shortcoming of IoT cloud networks which needs immediate addressing is the issue of IoT nodes when used within a virtual network of a cloud system. The IoT nodes often communicate over a virtual network and this communication needs to be monitored and managed by the cloud service provider (CSP). This CSP needs to make sure that no IoT node with malicious intent can thrive in such a network. In this paper we propose a framework for the security over virtual network for IoT nodes in a cloud system. Firstly, we propose a secure key management protocol between the CSP and the user group having the IoT nodes using a balanced incomplete block design (BIBD) model. Secondly, we device a lightweight cryptographic technique involving a key exchange protocol to establish a secure end-to-end communication between the IoT nodes. Finally, we measure the efficiency and resiliency of the distribution using different metrics. | en_US |
dc.publisher | IEEE | en_US |
dc.subject | Internet of Things | en_US |
dc.subject | Cloud Computing | en_US |
dc.subject | BIBD | en_US |
dc.subject | Lightweight cryptography | en_US |
dc.subject | Communication channel | en_US |
dc.title | Secure Key-distribution in IoT Cloud Networks | en_US |
dc.type | Article | en_US |
Appears in Collections: | Conference Papers |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
2017_ICSSS_SRMoharana_Secure.pdf | 238.13 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.