Loading

A Hardy Wall Encrypted System for Securing Iot Device Id
M. Sundarrajan1, A.E. Narayanan2
1M. Sundarrajan, Department of Computer Science and Engineering, Periyar Maniammai Institute of Science & Technology, Thanjavur, India.
2A.E. Narayanan, Department of Computer Science and Engineering, Periyar Maniammai Institute of Science & Technology, Thanjavur, India.

Manuscript received on 18 April 2019 | Revised Manuscript received on 25 May 2019 | Manuscript published on 30 May 2019 | PP: 586-590 | Volume-8 Issue-1, May 2019 | Retrieval Number: F2571037619 /19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Internet of Things (IoT) is being used immensely in numerous areas to reduce human and machine interactions. In an IoT environment, all the devices are connected to one another via the internet to communicate and work for a specific task. When it comes to IoT security, it still needs ample development as data leaks and security breaches still occur. Various research works have focused on securing the data being transmitted through various devices but have shown minimal focus on securing the device itself. In this research work, we propose a model exclusively built for an IoT environment namely “Hardy Security System” that works on securing the Device ID instead of securing the data being transmitted from the devices. The proposed system makes use of Fermat’s theorem and various steps involved in building this system is widely discussed in this paper. Use of advanced mathematical cryptology is rigorously done to minimize the security threats in the system. Various performance metrics are concerned and the overall performance analysis is observed to be more efficient than the traditional systems. The proposed system has reduced the overall data leak up to 20%from 80%. With the use of Hardy Wall algorithm the communication bandwidth saw a decrease from 5% to 3%. NS3 proved to be more efficient for performing and evaluating the results by making use of minimal memory consumption. The use of fake IDs were limited by about 2% and the factor of communication bandwidth was also considered. This makes the system safer for communication by reducing the risk of hacking the systems.
Keywords: IoT, Security, Fermat’s Theorem, Cryptography, Communication, Hardy Wall

Scope of the Article: IoT