2018
DOI: 10.3991/ijoe.v14i07.7306
|View full text |Cite
|
Sign up to set email alerts
|

Device Protocol Design for Security on Internet of Things based Smart Home

Abstract: Abstract-One of the major challenges that arise in the internet of things (IoT) based smart home systems is security issue. It is still relatively low in which the exchange of data between devices can easily be stolen by outsiders since it is connected to the internet. In this work, we present the details of the protocol messages in smart home appliances that are encrypted by RSA algorithm and AES in which the RSA key was regenerated in every turnover of the day (exactly at 00:00:00 or 1 x 24 hours) since the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
1
1

Relationship

2
7

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 13 publications
0
8
0
Order By: Relevance
“…Before data transmission through the Session Initiation Protocol (SIP) in a home network, mutual safety verification should be conducted between devices to block advance devices that may cause risks. To this end, a secure trust relationship should be established between smart home devices, external smart devices, and other IoT devices [112][113][114]. A study has been conducted to design a secure IoT microcontroller module using the Raspberry Pi platform and various IoT sensors [115][116][117].…”
Section: Keyword Clustering and Evolution Of Research On Iotmentioning
confidence: 99%
“…Before data transmission through the Session Initiation Protocol (SIP) in a home network, mutual safety verification should be conducted between devices to block advance devices that may cause risks. To this end, a secure trust relationship should be established between smart home devices, external smart devices, and other IoT devices [112][113][114]. A study has been conducted to design a secure IoT microcontroller module using the Raspberry Pi platform and various IoT sensors [115][116][117].…”
Section: Keyword Clustering and Evolution Of Research On Iotmentioning
confidence: 99%
“…The message protocol used to transmit GPS data to the host is based on the protocol elaborated in [16]. The specific structure of the message for door lock control is depicted in Fig.…”
Section: E Protocol Designmentioning
confidence: 99%
“…The communication protocol for the device is designed base on the work reported in [21] and [22]. In general, the data packet transmitted in the WSN consists header with 3 bytes length, 2 bytes of device address, packet initialization byte in hexadecimal form, device-specific data payload, and 1 byte for checksum.…”
Section: Protocol Designmentioning
confidence: 99%