Securing Communication in IoT Ecosystem Using Cryptographic Algorithms
Anshul Jain1, Tanya Singh2

1Tanya Singh,  Director, Department of IT & Engineering, Banasthali University, India.
2Anshul Jain, Technical Manager, Department of Network Technology and Management, Amity University, Uttar Pradesh, India.
Manuscript received on September 23, 2019. | Revised Manuscript received on October 15, 2019. | Manuscript published on October 30, 2019. | PP: 7258-7268 | Volume-9 Issue-1, October 2019 | Retrieval Number: A1851109119/2019©BEIESP| DOI: 10.35940/ijeat.A1851.109119
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: Internet of Things (IoTs) is defined as an ever growing network, which comprises of numerous physical objects with a specific IP address along with wireless internet communication, which enables the process of information sharing between two objects. Due to the frequent transfer and exchange of high confidential data between two devices through internet, there arise some susceptible attacks in IoT such as denial of service, eavesdropping attack and so on. A high-level authentication protocol and cryptographic techniques are required to resolve the issue of vulnerable attack and data loss. The current study presents a review of various IoT models and applications. Furthermore, the concerns related to security with respect to data sharing and numerous attacks have been featured in this paper. In order to avoid and minimize these attacks, numerous security measures and cryptographic algorithms have been developed by different authors. The study on several existing protocols has been carried out in this research along with the study on authentication algorithm developed by the authors. The result section contrasts a brief idea about the key requirements for the data security and authentication for the future aspects along with necessity of memory and power utilization. Additionally, some examination has been carried out briefing the future directions in which additionally work would be possible on the development of lightweight cryptography protocols.
Keywords: IoT, Cryptography, Authentication, Energy consumption, Data security, lightweight cryptography protocols.