Main Article Content

Abstract

In Today’s era of information data plays vital role in communication, Security has been a ponderous affair for the professionals in any field. Security is not about only protection of assets but privacy and authority to access in legitimate terms too. Cryptography provides the functionality that protects and secures the data through its encryption algorithms and authentication to its end users. IoT has been most attractive topic/area in recent era. Privacy and security is an inseparable part of this technology. Which could affect in multi fold, so, the paper majorly focuses on four major challenges involving Security, Privacy, Compatibility and Connectivity of IOT and apprehension of IoT with its provided solution of using cryptographic algorithms.

Article Details

Author Biographies

Dhruvi Mewada, Department of Information Technology Gandhinagar Institute of Technology Gandhinagar, India

Department of Information Technology Gandhinagar Institute of Technology Gandhinagar, India

Nidhi Dave, Department of Information Technology Gandhinagar Institute of Technology Gandhinagar, India

Department of Information Technology
Gandhinagar Institute of Technology
Gandhinagar, India

Prof.Rohan Kumar Prajapati, Department of Information Technology Gandhinagar Institute of Technology Gandhinagar, India

Department of Information Technology
Gandhinagar Institute of Technology
Gandhinagar, India

How to Cite
[1]
D. Mewada, N. Dave, and P. Prajapati, “A Survey: Prospects of Internet of Things (IoT) Using Cryptography Based on its Subsequent Challenges”, Ausjournal, vol. 1, no. 1, pp. 28-30, Feb. 2019.

References

[1] J. Byun, S. Kim, J. Sa, S. Kim, and Y. Shin, “Smart City Implementation Models Based on IoT Technology Smart City Implementation Models based on IoT,” vol. 129, pp. 209–212, 2016.
[2] E. Bertino and W. Lafayette, “Data Security and Privacy in the IoT,” pp. 18–20, 2016.
[3] T. Borgohain, “Survey of Security and Privacy Issues of Internet of Things,” pp. 1–7.
[4] . J. H. Ziegeldorf, O. G. Morchon, and K. Wehrle, “Privacy in the Internet of Things: Threats and Challenges,” no. i.
[5] N. Aleisa and K. Renaud, “Privacy of the Internet of Things: A Systematic Literature Review (Extended Discussion),” pp. 1–10, 2004.
[6] C. Zou, E. Engineers, and Z. Caufeng, “Security in the Internet of Things: A Review Security in the Internet of Things: A Review,” no. March 2015, 2012.
[7] H. Kaur, V. Verma, and J. Mishra, “Survey Paper cryptography”, pp 129-136.
[8] K. Lam and C. Chi, “Identity in the Internet-of-Things (IoT): New Challenges and Opportunities,” vol. 1, pp. 18– 26, 2016.
[9] “IOT SECURITY SOLUTIONS White paper”.
[10] T. Yousuf, R. Mahmoud, F. Aloul, and I. Zualkernan, vol. 5, no. 4, pp. 608–616, 2015. [10]
[11] R. Jain, “IoT Security: A Survey Abstract:” pp. 1–15.
[12] Z. Quan, T. Chunming, Z. Xianghan, and R. Chunming, “A secure user authentication protocol for sensor network in data capturing,” 2015.
[13] L. Duan, Y. Zhang, S. Chen, S. Wang, B. Cheng, and J. Chen, “Realizing IoT service’s policy privacy over publish / subscribe ‑ based middleware,” Springer plus, 2016.
[14] D. Sey, “A survey on authentication methods for the Internet of Things,” 2018.
[15] S. Tayal, N. Gupta, and P. Gupta, “A Review paper on Network Security and Cryptography,” vol. 10, no. 5, pp. 763–770, 2017.
[16] T. Borgohain, “Survey of Security and Privacy Issues of Internet of Things,” pp. 1–7.