International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 122 | Views: 210

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 10, October 2016 | Rating: 6.2 / 10


Host Identity Protocol for End-to-End Security in IoT

Huda Mulani | Aruna Gawade [2]


Abstract: This document aims to provide secure authentication of hosts using Host Identity Protocol. The impact and occurrence of Denial of service attacks and Man in middle attacks are tried to overcome and minimized. Furthermore, the various limitations in the HIP protocol are addressed here. The packet loss, network congestion, replay attack, packet flooding and spoofing are major considerations of HIP protocol are aimed to overcome.


Keywords: Internet of Things IoT, Wireless Sensor Networks, Host Identity Protocol, Multihoming and Mobility, HIP Base Exchange, Man in Middle


Edition: Volume 5 Issue 10, October 2016,


Pages: 1316 - 1319

Rate this Article


Select Rating (Lowest: 1, Highest: 10)

5

Your Comments

Characters: 0


Type Your Registered Email Address below to Rate the Article


Verification Code will appear in 2 Seconds ... Wait

Top