z-logo
open-access-imgOpen Access
Authentication of IOT Device Network Address with Implementation in Virtual Machine
Author(s) -
S.Uma Mageshwari*,
R. Santhi
Publication year - 2020
Publication title -
international journal of innovative technology and exploring engineering
Language(s) - English
Resource type - Journals
ISSN - 2278-3075
DOI - 10.35940/ijitee.c8725.019320
Subject(s) - computer science , spoofing attack , hacker , mac address , python (programming language) , cryptography , authentication (law) , computer security , encryption , computer network , code (set theory) , embedded system , operating system , set (abstract data type) , programming language
The IOT is booming in this era, to make user convenience much better than before. The IOT devices involved for communication can be vulnerable by the intruder. During data transmission for the IOT devices, it must be authenticated with suitable methodology. The hackers spoof the address and pretend to be the actual communicator. The other party trust this spoofed address is the authorized person. Hence, this can be processed with the appropriate Cryptography algorithms. The proposed approach is the fusion of AES and ECDSA with implementation of Python code in Ubuntu Linux. The established code takes the Network Address (MAC – Media Access Control) of running host directly through OS, such that the Network address is encrypted. The verification of the Network address is demonstrated with Windows and Ubuntu Virtual Machine. Therefore, the developed code must be installed in IOT device to accomplish secure data transmission. The motto of this paper is to enlighten the security for Network address of IOT devices.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here