E. Abinaya, K. Aishwarva, M Lordwin Cecil Prabhaker, G. Kamatchi, I. Malarvizhi
{"title":"A Performance Aware Security Framework to Avoid Software Attacks on Internet of Things (IoT) Based Patient Monitoring System","authors":"E. Abinaya, K. Aishwarva, M Lordwin Cecil Prabhaker, G. Kamatchi, I. Malarvizhi","doi":"10.1109/ICCTCT.2018.8550955","DOIUrl":null,"url":null,"abstract":"Internet of Things (IoT) is an established part of life by extending the communication and networking anytime, anywhere. IoT creates our lives simpler through a digital surroundings that will be perceptive, adaptive, and reactive to human desires. The Software attacks are the major sources of security vulnerabilities networks on a system. This type of attack consist of exploiting buffer overflows which is Denial of services, Trojan horse, worms and viruses intentionally insert malicious code into the system. The attack will be rectified by implementing the encryption algorithms such as Rivest-Shamir-Adleman (RSA) algorithm and Advanced Encryption Standard(AES) algorithms. These algorithms are implemented by using cryptool and the performances of loT devices are evaluated.","PeriodicalId":344188,"journal":{"name":"2018 International Conference on Current Trends towards Converging Technologies (ICCTCT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Current Trends towards Converging Technologies (ICCTCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCTCT.2018.8550955","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
Internet of Things (IoT) is an established part of life by extending the communication and networking anytime, anywhere. IoT creates our lives simpler through a digital surroundings that will be perceptive, adaptive, and reactive to human desires. The Software attacks are the major sources of security vulnerabilities networks on a system. This type of attack consist of exploiting buffer overflows which is Denial of services, Trojan horse, worms and viruses intentionally insert malicious code into the system. The attack will be rectified by implementing the encryption algorithms such as Rivest-Shamir-Adleman (RSA) algorithm and Advanced Encryption Standard(AES) algorithms. These algorithms are implemented by using cryptool and the performances of loT devices are evaluated.