Skip to main content

Security Enhancement of IoT Based Smart Home Using Hybrid Technique

  • Conference paper
  • First Online:
Machine Learning, Image Processing, Network Security and Data Sciences (MIND 2020)

Abstract

Internet of Things is an advance technology which is used all across the globe for sensing and collecting the data. Due to such unique nature of the network, various types of security attacks are possible on the network. Various enhanced security techniques had been proposed in previous years to overcome the problems of various attacks but there is no such technique which provides full security because day to day new attacks are arrived. Hybrid Technique in IoT security is enhanced security techniques which provide better security in IoT devices. In this paper, we proposed a Hybrid Security Technique which enhances the security and encryption speed of smart home appliances than the traditional algorithm. The purpose of the hybrid security algorithm is data security, confidentiality and integrity for IoT.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mahmoud, R., Yousuf, T., Aloul, F., Zualkernan, I.: Internet of Things (IoT) security: current status, challenges, and perspective measures. In: The 10th International Conference for Internet Technology and Secured Transactions (ICITST-2015)

    Google Scholar 

  2. Vignesh, R., Samurai, A.: Security on the Internet of Things (IOT) with challenges and countermeasures. In: International Journal of Engineering Development and Research, IJEDR, vol. 5(1) (2017). ISSN: 2321-9939

    Google Scholar 

  3. Joshitta, R.S.M., et al.: Security in IoT environment: a survey. Int. J. Inf. Technol. Mech. Eng.- IJITME, 2(7), 1–8 (2016)

    Google Scholar 

  4. Arjunasamy, A., Ramasamy, T.: A proficient heuristic for selecting friends in social internet of things. In: Proceedings 10th International Conference on Intelligent Systems and Control (ISCO), Coimbatore India, pp. 1–5, January 2016

    Google Scholar 

  5. Hassija, V., et al.: A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures. https://doi.org/10.1109/access.2019.2924045. IEEE Access

  6. Roukounaki, A., Efremidis, S., Soldatos, J., Neises, J., Walloschke, T., Kefalakis, N.: Scalable and configurable end-to-end collection and analysis of IoT security data: towards end-to-end security in IoT systems. In: Global IoT Summit (G IoTs) (2019)

    Google Scholar 

  7. Kunchok, T., Kirubanand, V.B.: A lightweight hybrid encryption technique to secure IoT data transmission. Int. J. Eng. Technol. 7(26), 236–240 (2018)

    Article  Google Scholar 

  8. Elhoseny, M., Shankar, K., Lakshmanaprabu, S.K., Maseleno, A., Arunkumar, N.: Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Neural Comput. Appl. 1 (2018)

    Google Scholar 

  9. Rizvi, S.A.M.: Performance analysis of AES and TwoFish encryption schemes. In: International Conference on Communication Systems and Network Technologies (2011)

    Google Scholar 

  10. Safi, A.: Improving the security of internet of things using encryption algorithms. Int. J. Comput. Inf. Eng. 11(5), 5 (2017)

    MathSciNet  Google Scholar 

  11. Albahar, M.A., Olawumi, O., Haataja, K., Toivanen, P.: Novel hybrid encryption algorithm based on AES, RSA, and TwoFish for bluetooth encryption. J. Inf. Secur. 9, 168–176 (2018)

    Google Scholar 

  12. Harba, E.S.I.: Secure Data Encryption Through a Combination of AES, RSA, and HMAC. Eng. Technol. Appl. Sci. Res. 7(4), 1781–1785 (2017)

    Google Scholar 

  13. Chandu, Y., Rakesh Kumar, K.S., Prabhukhanolkar, N.V., Anish, A.N., Rawal, S.: Design and implementation of hybrid encryption for security of IOT data. In: International Conference On Smart Technologies For Smart Nation (Smart TechCon) (2017)

    Google Scholar 

  14. Rose, G.S.: Security meets Nanoelectronics for the Internet of things applications. In: International Great Lakes Symposium on VLSI (GLSVLSI) (2016)

    Google Scholar 

  15. Talwana, J.C., Hua, H.J.: Smart world of Internet of Things (IoT) and its security concerns. In: IEEE International Conference on Internet of Things (I Things) and IEEE Green Computing and Communications (Green Com) and IEEE Cyber, Physical and Social Computing (CPS Com) and IEEE Smart Data (Smart Data) (2016)

    Google Scholar 

  16. Zakari, R.Y., Suleiman, A., Lawa, Z.K., Abdulrazak, N.: A review of SMS security using hybrid cryptography and use in mobile money system. Am. J. Comput. Sci. Eng. 2(6), 53–62 (2015)

    Google Scholar 

  17. Patel, G.R., Pancha, K.: Hybrid encryption algorithm. IJEDR 2(2) (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Saijshree Srivastava .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Srivastava, S., Prakash, S. (2020). Security Enhancement of IoT Based Smart Home Using Hybrid Technique. In: Bhattacharjee, A., Borgohain, S., Soni, B., Verma, G., Gao, XZ. (eds) Machine Learning, Image Processing, Network Security and Data Sciences. MIND 2020. Communications in Computer and Information Science, vol 1241. Springer, Singapore. https://doi.org/10.1007/978-981-15-6318-8_44

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-6318-8_44

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-6317-1

  • Online ISBN: 978-981-15-6318-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics