Data Security and Shortest Path Finding in IOT

Authors

  • W. Winfredruby  M. Phil Scholar, The Gandigram Rural Institute (Deemed to be University), Tamilnadu, India
  • S Sivagurunathan  Assistant Professor, The Gandigram Rural Institute (Deemed to be University), Tamilnadu, India

DOI:

https://doi.org//10.32628/CSEIT1952146

Keywords:

Data access center for the Internet of things. ASCII Values. low latency. Shortest path algorithm. Network congestion.

Abstract

Nowadays with the rapid growth of the smart city and the internet of things applications are difficult to connect the data access center, to meet service requirements with low latency and high quality while sending and receiving data access requests. At the same time, lower security performance occurred. In temperature and humidity sensor applications we approach a cryptography technique to protect data. It is an ASCII values-based technique which uses some numerical calculation to perform encryption and decryption. Then the use of the shortest path algorithm we find an entire possible path using current node detail and the destination node is sent by the source node to the neighbourhood nodes. Neighbourhood node receives the detail and checks the destination node. In case, the neighbourhood node is not the destination, it appends its detail along with the received details and sends to its neighbourhood nodes and the process continues till reaching the destination. By calculating the link delay between the two nodes. We can find the delay time taken from source to destination. At last we display the entire possible shortest paths and secure data. It is useful when network congestion occurs. In this paper, we also overcome this problem.

References

  1. Da Xu, Li, Wu He, and Shancang Li. "Internet of things in industries: A survey." IEEE Transactions on industrial informatics 10.4 (2014): 2233-2243.
  2. Akanksha, Mathur. "An ASCII value-based data encryption algorithm and its comparison with other symmetric data encryption algorithms." International Journal on Computer Science and Engineering (IJCSE) 4.09 (2012): 1650.
  3. Stallings, W [2005]. “Cryptography and Network Security Principles and Practice,” 4th Edition, Pearson Education-Prentice Hall, ISBN 10: 0-13-609704-9 ISBN 13: 978-0-13-609704-4.
  4. Barroca, Norberto, et al. "Wireless sensor networks for temperature and humidity monitoring within concrete structures." Construction and Building Materials 40 (2013): 1156-1166.
  5. Da Xu, Li, Wu He, and Shancang Li. "Internet of things in industries: A survey." IEEE Transactions on industrial informatics 10.4 (2014): 2233-2243.
  6. Gubbi, Jayavardhana, et al. "Internet of Things (IoT): A vision, architectural elements, and future directions." Future generation computer systems 29.7 (2013): 1645-1660.
  7. Ye, Ning, et al. "An efficient authentication and access control scheme for perception layer of the internet of things." Applied Mathematics & Information Sciences 8.4 (2014): 1617.
  8. Suraj Arya [2017].” ASCII Based Encryption Decryption Technique for Information Security and Communication. "International Conference on Innovative Trends in Science, Engineering, and Management-(2017).
  9. Mathur, Akanksha. "A Research paper: An ASCII value-based data encryption algorithm and its comparison with other symmetric data encryption algorithms." International Journal on Computer.
  10. Xiao, Ying, et al. "The constrained shortest path problem: Algorithmic approaches and an algebraic study with generalization." AKCE International Journal of Graphs and Combinatorics 2.2 (2005): 63-86.
  11. Crauser, Andreas, et al. "A parallelization of Dijkstra's shortest path algorithm." International Symposium on Mathematical Foundations of Computer Science. Springer, Berlin, Heidelberg, 1998.
  12. Meng, Yi, and Chen Qinghai. "DCSACA: distributed constraint service-aware collaborative access algorithm based on large-scale access to the Internet of Things." The Journal of Supercomputing 74.12 (2018): 6408-6427.
  13. Kuipers, Fernando, et al. "An overview of constraint-based path selection algorithms for QoS routing." IEEE Communications Magazine 40.12 (2002): 50-55.

Downloads

Published

2019-04-30

Issue

Section

Research Articles

How to Cite

[1]
W. Winfredruby, S Sivagurunathan, " Data Security and Shortest Path Finding in IOT, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 2, pp.551-557, March-April-2019. Available at doi : https://doi.org/10.32628/CSEIT1952146