CFP last date
20 January 2025
Reseach Article

ITCP based Security Enhancement for IoT Devices in IPV6 Protocol

by Shubhalika Dihulia, Tanveer Farooqui
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 178 - Number 2
Year of Publication: 2017
Authors: Shubhalika Dihulia, Tanveer Farooqui
10.5120/ijca2017915759

Shubhalika Dihulia, Tanveer Farooqui . ITCP based Security Enhancement for IoT Devices in IPV6 Protocol. International Journal of Computer Applications. 178, 2 ( Nov 2017), 36-40. DOI=10.5120/ijca2017915759

@article{ 10.5120/ijca2017915759,
author = { Shubhalika Dihulia, Tanveer Farooqui },
title = { ITCP based Security Enhancement for IoT Devices in IPV6 Protocol },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2017 },
volume = { 178 },
number = { 2 },
month = { Nov },
year = { 2017 },
issn = { 0975-8887 },
pages = { 36-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume178/number2/28647-2017915759/ },
doi = { 10.5120/ijca2017915759 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:49:18.759254+05:30
%A Shubhalika Dihulia
%A Tanveer Farooqui
%T ITCP based Security Enhancement for IoT Devices in IPV6 Protocol
%J International Journal of Computer Applications
%@ 0975-8887
%V 178
%N 2
%P 36-40
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, present an improved transmission control protocol. For IoT devices. Currently there are different protocols are exist based on user data gram approach. Similarly TCP is also worked alone, In this present work proposed and improved transmission control protocol that is the hybrid concept of TCP and UDP on IPV6 platform. In the ITCP protocol TCP is used for link connection between two devices and UDP is used for the data sending. On the basic on this proposed new protocol that shows good improved result the transmission time, throughput, packet delivery ratio and other parameters as compare to other IoT protocol present in the IoT. For the simulation of proposed ITCP protocol used JAVA platform. Also compare the proposed result with different protocols.

References
  1. Jatinder Singh, Thomas Pasquier, Jean Bacon, Hajoon Ko, and David Eyers, “Twenty security considerations for cloud-supported Internet of Things”, Internet Of Things Journal, IEEE 2015.
  2. Flauzac Olivier, Gonzalez Carlos, Nolot Florent, “New Security Architecture for IoT Network”, International Workshop on Big Data and Data Mining Challenges on IoT and Pervasive Systems (BigD2M 2015), s. Published by Elsevier, Science Direct, Procardia Computer Science 52 (2015)
  3. Jorge Granjal, Edmundo Monteiro, and Jorge Sá Silva, “Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues”, IEEE communications surveys & tutorials July 2015.
  4. Ricardo Neisse, Igor Nai Fovino, Gianmarco Baldini, Vera Stavroulakiy, Panagiotis Vlacheasy and Raffaele Giaffreda “Sec Kit: A Model-based Security Toolkit for the Internet of Things”. Computers & Security · September 2014.
  5. John A. Stankovic, “Research Directions for the Internet of Things”, National Science Foundation under grants CNS-1239483, CNS-1017363, and CNS-1319302. Copyright (c) 2014 IEEE
  6. Design and Implementation of a Simple User Interface of a Smartphone for the Elderly 2014 IEEE 3rd global conferences on consumer electronics(GCCE)
  7. Securing the IP-based internet of things with HIP and DTLS, April 2013
  8. Research Directions for the Internet of Things 2014 IEEE
  9. Pranay Yadav, “Color Image Noise Removal by Modified Adaptive Threshold Median Filter for RVIN” , Electronic Design, Computer Networks & Automated Verification (EDCAV), 2015 pp - 175 - 180, 29-30 ,
  10. Thomas Kothmayr, Corinna Schmitt, Wen Hu, Michael Brunig, Georg Carle, “DTLS based Security and Two-Way Authentication for the Internet of Things”, Elsevier Journal of AdHoc Networks in May 2013.
  11. Z. Shelby, K. Hartke, C. Bormann, B. Frank, Constrained Application Protocol (CoAP), IETF draft, RFC Editor (March 2013).
  12. Slimfit — A HIP DEX compression layer for the IP-based Internet of Things , OCTOBER 2013
  13. Convergence of MANET and WSN in IoT urban scenarios IEEE SENSORS JOURNAL · OCTOBER 2013.
  14. Yadav P., Sharma S., Tiwari P., Dey N., Ashour A.S., Nguyen G.N. “A Modified Hybrid Structure for Next Generation Super High Speed Communication using TDLTE and Wi-Max” for publication in Studies in Big Data, Springer 2017. https://link.springer.com/chapter/10.1007/978-3-319-60435-0_21#citeas.
  15. Early infrastructure of an Internet of Things in Spaces for Learning Eighth IEEE International Conference on Advanced Learning Technologies 2012.
  16. S. Raza, T. Voigt, V. Jutvik, and Lightweight IKEv2: A Key Management Solution for both the Compressed IPsec and the IEEE 802.15.4 Security, in: Proceedings of the IETF Workshop on Smart Object Security, 2012.
  17. Pranay Yadav and Parool Singh2, “Color Impulse Noise Removal by Modified Alpha Trimmed Median Mean Filter for FVIN”, IEEE International Conference on Computational Intelligence and Computing (IEEE-ICCIC), pp: 1 – 8, 10.1109/ICCIC.2014.7238369, Dec – 2014.
  18. Tobias Heer, Oscar Garcia-Morchony, Rene Hummen, Sye Loong Keohy, Sandeep S. Kumary, and Klaus Wehrle, “Security Challenges in the IP-based Internet of Things”, Springer Journal on Wireless Personal Communications, December 2011, Volume 61, Issue 3, pp 527-542.
  19. Embedded security for Internet of Things APRIL 2011 DOI: 10.1109/NCETACS.2011.5751382 · Source: IEEE Xplore
  20. Sharma, S. and Yadav, P, “Removal of Fixed Valued Impulse Noise by Improved Trimmed Mean Median Filter” IEEE International Conference on Computational Intelligence and Computing (IEEE-ICCIC)pp: 1 - 8, DOI: 10.1109/ICCIC.2014.7238368,.
  21. S. Dawson-Haggerty, A. Tavakoli, D. Culler, Hydro: A Hybrid Routing Protocol for Low-Power and Lossy Networks, in: Proceedings of the 1st IEEE International Conference on Smart Grid Communications, Smart Grid Comm, 2010, pp. 268-273
  22. W. Hu, H. Tan, P. Corke, W. C. Shih, S. Jha, Toward Trusted Wireless Sensor Networks, ACM Transactions on Sensor Networks 7 (2010) 5:1-5:25.
  23. W. Jung, S. Hong, M. Ha, Y.-J. Kim, D. Kim, SSL-Based Lightweight Security of IP-Based Wireless Sensor Networks, International Conference on Advanced Information Networking and Applications Workshops (2009) 1112-1117.
  24. D. Raymond, S. Midki_, Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses, Pervasive Computing 7 (1) (2008).
  25. Luk, G. Mezzour, A. Perrig, V. Gligor, MiniSec: A Secure Sensor Network Communication Architecture, in: Proceedings of the 6th International Conference on Information Processing in Sensor Networks, IPSN, 2007, pp. 479-488
  26. M. Wurm, Y. Zhu, M. Millard, S. Fung, N. Gura, H. Eberle, S. C. Shantz, Sizzle: A Standards-based End-to-End Security Architecture for the Embedded Internet, Pervasive Mob. Comput. 1 (2005) 425-445.
  27. H. Chan, A. Perrig, D. Song, Random Key Predistribution Schemes for Sensor Networks, in: Proceedings of Symposium on Security and Privacy, 2003,
Index Terms

Computer Science
Information Sciences

Keywords

Computational time throughput packet delivery ratio (PDR) packet loss transmission control protocol (TCP) and User data gram protocol (UDP).