Loading

Mitigation of Spoofing Attacks on IoT Home Networks
Archana K C1, Harini N2
1Ms. Archana K C, Quality Assurance Engineer, M.Tech and B.Tech, Amrita School of Engineering, Coimbatore (Tamil Nadu), India.
2Dr. Harini N, Assistant Professor, Department of Computer Science and Engineering, Amrita School of Engineering, Coimbatore (Tamil Nadu), India.
Manuscript received on 26 November 2019 | Revised Manuscript received on 08 December 2019 | Manuscript Published on 14 December 2019 | PP: 240-245 | Volume-9 Issue-1S October 2019 | Retrieval Number: A10471091S19/19©BEIESP | DOI: 10.35940/ijeat.A1047.1091S19
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Internet of things is now everywhere and even if people are aware of it or not, it is part of our everyday life. For something that is so much in pace with our life, iot collects a lot of information about our day today life, which in case of a data leak or hijacking could lead to catastrophic effects in the society. Still iot devices are not manufactured keeping in mind the security factor. This paper dives into the problem of spoofing attacks dealt by iot devices and comes up with an authentication mechanism, which uses variants of elliptic curve cryptography to protect against such said attacks without exhausting the devices in case of computational power and storage area. The experimentation clearly revealed the strength of the scheme to mitigate spoofing attacks on the iot home networks.
Keywords: MQTT, IoT, ECC, PKG, ECDH, CoAP, REST, ECDSA.
Scope of the Article: IoT