Open Access   Article Go Back

Importance of Sensor Readings and Its Secured Delivery in Internet of Things

Kratika Gupta1 , Ashwani Kumar2 , Suraj Rasal3 , Varsha S. Rasal4

  1. Department of Computer Engineering, Bharati Vidyapeeth Deemed University College of Engineering Pune, India.
  2. Tata Consultancy Services, Pune, India.
  3. Department of Computer Engineering, Bharati Vidyapeeth Deemed University College of Engineering Pune, India.
  4. Department of Computer Science & Engineering, Nehru College of Engineering &Research Centre, Thrissur, India.

Correspondence should be addressed to: surasal@bvucoep.edu.in .

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-1 , Page no. 320-325, Jan-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i1.320325

Online published on Jan 31, 2018

Copyright © Kratika Gupta, Ashwani Kumar, Suraj Rasal, Varsha S. Rasal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Kratika Gupta, Ashwani Kumar, Suraj Rasal, Varsha S. Rasal, “Importance of Sensor Readings and Its Secured Delivery in Internet of Things,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.1, pp.320-325, 2018.

MLA Style Citation: Kratika Gupta, Ashwani Kumar, Suraj Rasal, Varsha S. Rasal "Importance of Sensor Readings and Its Secured Delivery in Internet of Things." International Journal of Computer Sciences and Engineering 6.1 (2018): 320-325.

APA Style Citation: Kratika Gupta, Ashwani Kumar, Suraj Rasal, Varsha S. Rasal, (2018). Importance of Sensor Readings and Its Secured Delivery in Internet of Things. International Journal of Computer Sciences and Engineering, 6(1), 320-325.

BibTex Style Citation:
@article{Gupta_2018,
author = {Kratika Gupta, Ashwani Kumar, Suraj Rasal, Varsha S. Rasal},
title = {Importance of Sensor Readings and Its Secured Delivery in Internet of Things},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2018},
volume = {6},
Issue = {1},
month = {1},
year = {2018},
issn = {2347-2693},
pages = {320-325},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1677},
doi = {https://doi.org/10.26438/ijcse/v6i1.320325}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i1.320325}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1677
TI - Importance of Sensor Readings and Its Secured Delivery in Internet of Things
T2 - International Journal of Computer Sciences and Engineering
AU - Kratika Gupta, Ashwani Kumar, Suraj Rasal, Varsha S. Rasal
PY - 2018
DA - 2018/01/31
PB - IJCSE, Indore, INDIA
SP - 320-325
IS - 1
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
568 368 downloads 269 downloads
  
  
           

Abstract

Internet of things plays a vital role in the human life. Raspberry Pi is one of the widely used IoT based module. IoT includes information delivery as important property aspect. In this paper importance of sensor reading is highlighted. Sensor readings are important values on which further values may depend. Like IoT appliances used in chemical , pharmaceutical or agricultural industries. In such industries, sensor reading values are important. This paper proposed the importance of sensor value delivery and its impact. IoT based water plantation is considered to explain how sensor values are used to perform certain tasks using raspberry pi module.

Key-Words / Index Term

IoT,sensor,Raspberrypi,security

References

[ 1] Zhang, Zhi-Kai, et al. [2014] IoT security: ongoing challenges and research opportunities. 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications. IEEE
[ 2] Jing, Qi, et al. [2014] Security of the internet of things: Perspectives and challenges, Wireless Networks 20.8 Springer : 2481-2501.
[ 3] VS. Rasal, SU. Rasal, ST. Shelar “A Cryptographicaly Imposed DCP-ABE-M Scheme with Attribute Based Proxy Re-Encryption and Keyword Search in Untrusted Public Cloud”, The IIOAB Journal, Vol.8, Issue.2, pp.21-26, Feb 2017
[ 4] VT. Mulik, K. Saritha, SU. Rasal, “Privacy Preserving Through Mediator in Decentralized Ciphertext policy Attribute Based Encryption”, IJRET: International Journal of Research in Engineering and Technology, Vol.5, Issue.6, pp. 535-540, 2016
[ 5] Stallings, William. [2006] Cryptography and network security: principles and practices. Pearson Education India.
[ 6] SU. Rasal , R. Redhu , VS. Rasal , ST. Shelar “Improving Source Code Encryption using Proposed Cipher Logic”, IJCSE: International Journal of Computer Sciences and Engineering, Vol.5(4), Apr 2017, E-ISSN: 2347-2693.
[ 7] Suraj U. Rasal , Raghav Agarwal , Varsha S Rasal , Shraddha T. Shelar, “IOT Appliance Access Structure using ABE Based OTP Technique” The IIOAB Journal, Vol. 7 , Suppl 1, 180–186 , Sept 2016
[ 8] Yao Xuanxia, Zhi Chen, and Ye Tian. [2015] A lightweight attribute-based encryption scheme for the Internet of Things." Future Generation Computer Systems 49 Elsevier: 104-112.
[ 9] Touati, Lyes, Yacine Challal, and Abdelmadjid Bouabdallah. [2014] C-cp-abe: Cooperative ciphertext policy attributebased encryption for the internet of things, Advanced Networking Distributed Systems and Applications (INDS), 2014 International Conference on. IEEE.
[ 10] SU. Rasal, ST. Shelar, VS. Rasal, “Securing Internet Banking Using Multiple Attributes Scheme And OTP”, The IIOAB Journal, Vol.7, Issue.10, pp.26-30, 2016.
[ 11] S. Rasal, S. Relan, K. Saxena, “OTP Processing using UABE & DABE with Session management”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.6, Issue.5, pp.57-59, 2016.
[ 12] VS. Rasal, SU. Rasal, AK. Joseph, NK. Joseph “Amelioration of Decentralized Cipher Text Policy Attribute Based Encryption with Mediator technique by adding Salt”; IJARCS: International Journal of Advanced Research in Computer Science, Volume 8, Issue. 5, PP. 1709-1713, May – June 2017
[ 13] Suo, Hui, et al. [2012] Security in the internet of things: a review, Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on. IEEE Vol. 3.
[ 14] Sicari Sabrina et al. [2015] Security, privacy and trust in Internet of Things: The road ahead." Computer Networks 76 Elsevier 146-164.
[ 15] Roman, Rodrigo, Jianying Zhou, and Javier Lopez. [2013] On the features and challenges of security and privacy in distributed internet of things, Computer Networks 57.10 Elsevier: 2266-2279.