A dramatic change by the growth of new ubiquitous computing, our globe is moving towards the fully connected paradigm called Internet of Things (IoT). The world is being connected and interlinked with the exponential growth of this pervasive technology. It plays a significant role in many fields such as healthcare, manufacturing industry, agriculture, transportation, smart homes etc and reinforces our everyday life. It acts as an aegis for covering all the factors such as protocols, key elements, technologies etc. IoT includes many capabilities and numerous mechanisms but protection hassle that slow down the era. In this paper we discussed about essential protocols and security issues of IoT.
The broad vision of IoT focuses the highly increasing the electronic devices and application in which leads to the growth of technology. The enormous amounts of constrained devices are interlinked, communicate and coordinate with each other to fulfill its tackier mainly concentrate on low energy, Resource constraint, self-organization and short range of communication. In this heterogeneous environment of Antiprivacy and security are the greatest challenge. The secure information exchange is most critical pitfall to ensure the system security. In this paper we discussed and analyzed about various security algorithms like Triple DES, AES, Blowfish and ECCwith their structure, block size, key generation, number of rounds with different settings. In order to analyze the efficiency of all said algorithms, we made an experiment on algorithms works on constrained devices in different contexts, all our experiments show that ECC is the most suitable security algorithm in IOT contexts.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.