Downloads: 123 | Views: 259
Research Paper | Computer Science & Engineering | Iraq | Volume 8 Issue 8, August 2019 | Popularity: 6.3 / 10
New Technique for Internet of Things Security based on the Hybrid Mcrypton - Blowfish and Chaotic System
Haider K. Hoomod, Ahmed A. Ali
Abstract: Internet of Things is a topic of much interest and, in last few year as one of the main focuses, links various kinds of devices to the Internet and even exchanges its data. The advent of IoT which has vast amount of connected devices enables us to monitor and control of real world and changes our daily lifestyle never available before. An important need to protect the data transferred from the devices of the user (mobile devices) and devices control things over the Internet. In this paper we propose a mechanism based on an algorithm that combines two algorithms to solve the problem of security in data transmission. We used a mobile phone to control and send signals to the raspberry pi, Which in turn controls and related devices that run in smart home
Keywords: internet of things security, blowfish, mcrypton, chaos
Edition: Volume 8 Issue 8, August 2019
Pages: 650 - 652
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 9 Issue 3, March 2020
Pages: 1678 - 1689Chaos Engineering for Building Resilient Distributed Systems
Venkata Naga Sai Kiran Challa
Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Informative Article, Computer Science & Engineering, United States of America, Volume 13 Issue 11, November 2024
Pages: 851 - 855Chaos Testing: A Proactive Framework for System Resilience in Distributed Architectures
Chandra Shekhar Pareek
Downloads: 101
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Downloads: 109
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 3075 - 3078Secret Data Hiding in Compressed Video Bit Streams for Privacy Information Protection
B. Vengadalakshmi, S. Abiramasundari
Downloads: 109
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 1844 - 1847A Providing Security on Cloud Data Hadoop using Symmetric Encryption and Identity Authentication
Kale Rohitkumar Bhausaheb, R.L.Paikrao