Research Article | Open Access | Download Full Text
Volume 1 | Issue 1 | Year 2022 | Article Id: DST-V1I1P102 DOI: https://doi.org/10.59232/DST-V1I1P102
A Fog Computing Approach for Securing IoT Devices Data using DNA-ECC Cryptography
R.Surendiran, K. Raja
| Received | Revised | Accepted | Published |
|---|---|---|---|
| 11 May 2022 | 29 Jun 2022 | 02 Jul 2022 | 09 Jul 2022 |
Citation
R.Surendiran, K. Raja. “A Fog Computing Approach for Securing IoT Devices Data using DNA-ECC Cryptography.” DS Journal of Digital Science and Technology, vol. 1, no. 1, pp. 10-16, 2022.
Abstract
Keywords
Fog computing, Encryption, IoT, DNA, Elliptic curve cryptography, Cluster head
References
[1] Mohamed Elhoseny et al., “Hybrid Optimization with Cryptography Encryption for Medical Image Security in Internet of Things,” Neural Computing and Applications, vol. 32, no. 15, pp. 10979-10993, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Tarek Gaber et al., “Trust-Based Secure Clustering in WSN-Based Intelligent Transportation Systems,” Computer Networks, vol. 146, pp. 151-158, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[3] R. Surendiran, and K. Alagarsamy, "Privacy Conserved Access Control Enforcement in MCC Network with Multilayer Encryption," International Journal of Engineering Trends and Technology, vol. 4, no. 5, pp. 2217-2224, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Mayank Dixit, Jitendra Kumar, and Rajesh Kumar, “Internet of Things and Its Challenges,” 2015 International Conference on Green Computing and Internet of Things, IEEE, pp. 810-814, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Luis M. Vaquero, and Luis Rodero-Merino, “Finding Your Way in the Fog: Towards a Comprehensive Definition of Fog Computing,”ACM SIGCOMM Computer Communication Review, vol. 44, no. 5, pp. 27-32, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[6] S. Gavaskar et al., “Three Counter Defense Mechanism for TCP SYN Flooding Attacks,” International Journal of Computer Applications, vol. 6, no. 6, pp. 12-15, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Jie Lin et al., “A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications,” IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1125-1142, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Opeyemi Osanaiye et al., ”From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework,” IEEE Access, vol. 5, pp. 8284–8300, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[9] R. Surendiran, and K. Alagarsamy, "A Novel Tree Based Security Approach for Smart Phones," International Journal of Computer Trends and Technology, vol. 3, no. 6, pp. 787-792, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Lei Xu et al., “DIoTA: Decentralized-Ledger-Based Framework for Data Authenticity Protection in Iot Systems,” IEEE Network, vol. 34, no. 1, pp. 38-46, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[11] S. Gavaskar, E. Ramaraj, and R. Surendiran, “A Compressed Anti IP Spoofing Mechanism Using Cryptography,” International Journal of Computer Science and Network Security, vol. 12, no. 11, pp. 137-140, 2012.
[Google Scholar] [Publisher Link]
[12] Arun Murugesan et al., “Analysis on Homomorphic Technique for Data Security in Fog Computing,” Transactions on Emerging Telecommunications Technologies, vol. 32, no. 9, p. E3990, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[13] V. Lakshman Narayana, and R. S. M. Lakshmi Patibandla, “An Efficient Fog‐Based Model for Secured Data Communication,” Integration of Cloud Computing with Internet of Things: Foundations, Analytics, and Applications, pp. 41-55, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[14] P. Chinnasamy et al., “Efficient Data Security Using Hybrid Cryptography on Cloud Computing,” Inventive Communication and Computational Technologies, Springer, Singapore, pp. 537-547, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[15] R. Surendiran, and K. Alagarsamy, “A Crtitical Approach for Intruder Detection in Mobile Devices,” SSRG International Journal of Computer Science and Engineering, vol. 1, no. 4, pp. 6-14, 2014.
[16] Saeed Javanmardi et al., “FUPE: A Security Driven Task Scheduling Approach for SDN-Based Iot–Fog Networks,” Journal of Information Security and Applications, vol. 60, p. 102853, 2021.