Host Identity Protocol for End-to-End Security in IoT
Journal: International Journal of Science and Research (IJSR) (Vol.5, No. 10)Publication Date: 2016-10-05
Authors : Huda Mulani; Aruna Gawade;
Page : 1316-1319
Keywords : Internet of Things IoT; Wireless Sensor Networks; Host Identity Protocol; Multihoming and Mobility; HIP Base Exchange; Man in Middle;
Abstract
This document aims to provide secure authentication of hosts using Host Identity Protocol. The impact and occurrence of Denial of service attacks and Man in middle attacks are tried to overcome and minimized. Furthermore, the various limitations in the HIP protocol are addressed here. The packet loss, network congestion, replay attack, packet flooding and spoofing are major considerations of HIP protocol are aimed to overcome.
Other Latest Articles
- Bio-Waste Processing With Black Solider Fly Larvae
- Comparative Study between Accuracy of Mammography and USG in Preoperative Assessment of Breast Cancer
- The Effect of Method and Writing Interest on the Students Poetry Writing Ability at Indonesia Language and Literature Education Study Program of Fkip Uhamka
- Efficiency of the Strategic Planning of the Human Resources (System of Libyan Universities as a Model)
- Effect of Agency Banking on Financial Inclusion in Kenya
Last modified: 2021-07-01 14:45:37