Importance of Sensor Readings and Its Secured Delivery in Internet of Things
DOI:
https://doi.org/10.26438/ijcse/v6i1.320325Keywords:
IoT, sensor, Raspberrypi, securityAbstract
Internet of things plays a vital role in the human life. Raspberry Pi is one of the widely used IoT based module. IoT includes information delivery as important property aspect. In this paper importance of sensor reading is highlighted. Sensor readings are important values on which further values may depend. Like IoT appliances used in chemical , pharmaceutical or agricultural industries. In such industries, sensor reading values are important. This paper proposed the importance of sensor value delivery and its impact. IoT based water plantation is considered to explain how sensor values are used to perform certain tasks using raspberry pi module.
References
[ 1] Zhang, Zhi-Kai, et al. [2014] IoT security: ongoing challenges and research opportunities. 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications. IEEE
[ 2] Jing, Qi, et al. [2014] Security of the internet of things: Perspectives and challenges, Wireless Networks 20.8 Springer : 2481-2501.
[ 3] VS. Rasal, SU. Rasal, ST. Shelar “A Cryptographicaly Imposed DCP-ABE-M Scheme with Attribute Based Proxy Re-Encryption and Keyword Search in Untrusted Public Cloud”, The IIOAB Journal, Vol.8, Issue.2, pp.21-26, Feb 2017
[ 4] VT. Mulik, K. Saritha, SU. Rasal, “Privacy Preserving Through Mediator in Decentralized Ciphertext policy Attribute Based Encryption”, IJRET: International Journal of Research in Engineering and Technology, Vol.5, Issue.6, pp. 535-540, 2016
[ 5] Stallings, William. [2006] Cryptography and network security: principles and practices. Pearson Education India.
[ 6] SU. Rasal , R. Redhu , VS. Rasal , ST. Shelar “Improving Source Code Encryption using Proposed Cipher Logic”, IJCSE: International Journal of Computer Sciences and Engineering, Vol.5(4), Apr 2017, E-ISSN: 2347-2693.
[ 7] Suraj U. Rasal , Raghav Agarwal , Varsha S Rasal , Shraddha T. Shelar, “IOT Appliance Access Structure using ABE Based OTP Technique” The IIOAB Journal, Vol. 7 , Suppl 1, 180–186 , Sept 2016
[ 8] Yao Xuanxia, Zhi Chen, and Ye Tian. [2015] A lightweight attribute-based encryption scheme for the Internet of Things." Future Generation Computer Systems 49 Elsevier: 104-112.
[ 9] Touati, Lyes, Yacine Challal, and Abdelmadjid Bouabdallah. [2014] C-cp-abe: Cooperative ciphertext policy attributebased encryption for the internet of things, Advanced Networking Distributed Systems and Applications (INDS), 2014 International Conference on. IEEE.
[ 10] SU. Rasal, ST. Shelar, VS. Rasal, “Securing Internet Banking Using Multiple Attributes Scheme And OTP”, The IIOAB Journal, Vol.7, Issue.10, pp.26-30, 2016.
[ 11] S. Rasal, S. Relan, K. Saxena, “OTP Processing using UABE & DABE with Session management”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.6, Issue.5, pp.57-59, 2016.
[ 12] VS. Rasal, SU. Rasal, AK. Joseph, NK. Joseph “Amelioration of Decentralized Cipher Text Policy Attribute Based Encryption with Mediator technique by adding Salt”; IJARCS: International Journal of Advanced Research in Computer Science, Volume 8, Issue. 5, PP. 1709-1713, May – June 2017
[ 13] Suo, Hui, et al. [2012] Security in the internet of things: a review, Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on. IEEE Vol. 3.
[ 14] Sicari Sabrina et al. [2015] Security, privacy and trust in Internet of Things: The road ahead." Computer Networks 76 Elsevier 146-164.
[ 15] Roman, Rodrigo, Jianying Zhou, and Javier Lopez. [2013] On the features and challenges of security and privacy in distributed internet of things, Computer Networks 57.10 Elsevier: 2266-2279.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
