ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Host Identity Protocol for End-to-End Security in IoT

Journal: International Journal of Science and Research (IJSR) (Vol.5, No. 10)

Publication Date:

Authors : ; ;

Page : 1316-1319

Keywords : Internet of Things IoT; Wireless Sensor Networks; Host Identity Protocol; Multihoming and Mobility; HIP Base Exchange; Man in Middle;

Source : Downloadexternal Find it from : Google Scholarexternal


This document aims to provide secure authentication of hosts using Host Identity Protocol. The impact and occurrence of Denial of service attacks and Man in middle attacks are tried to overcome and minimized. Furthermore, the various limitations in the HIP protocol are addressed here. The packet loss, network congestion, replay attack, packet flooding and spoofing are major considerations of HIP protocol are aimed to overcome.

Last modified: 2021-07-01 14:45:37