Abstract
Smart cities are the emerging topics in the recent decade with advancements in science and technology especially in the areas of communication technologies. Concept of smart cities depicts the inteconnectivity of physical objects to provide transparency in communication between the physical components or objects. However, implementation of a smart city using Internet of Things (IoT) which is the backbone architecture is affected by several attacks in the wireless communication domain during communication of information between the components as well as cyber-attacks which necessiate the need for the intrusion detection mechanism to prevent any illegeal loss data. This research paper addresses these security issues by implementing the IoT architecture and systematically analysing the demands in security aspects as well as justifying the results with experimentations conducted in a simulated smart city environment.








Similar content being viewed by others
References
Cirani, S., Ferrari, G., Veltri, L.: Enforcing security mechanisms in the IP based internet of things: an algorithmic overview. Int. J. Sens. 6, 197–226 (2013)
Suresh, M., Neema, M.: Hardware implementation of Blowfish algorithm for the secure data transmission in internet of things. Procedia. technol. (2016). https://doi.org/10.1016/j.protcy.2016.08.104
Yue, L.H., Guo, L., Li, R., Asaeda, H., Fang, Y.: From data clouds: enabling community-based data-centric services over the internet of things. IEEE Int. Things J. 1(5), 472–482 (2014)
Mandal, P.C.: Superiority of blowfish algorithm. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2(9), 196–201 (2012)
Bhanot, R., Hans, R.: A review and comparative analysis of various encryption algorithms. Int. J. Secur. Appl. 9(4), 289–306 (2015)
Muthukumar, G., Raj, G.D.P.: A comparative analysis on symmetric key encryption algorithms. Int. J. Adv. Res. Comput. Eng. Technol. 3(2), 1087–1097 (2014)
Can, O., Sahingoz, OK.: “A survey of intrusion detection systems in wireless sensor networks”. In: 6th international conference on modeling, simulation, and applied optimization, 2015
Welbourne, E., et al.: Building the internet of things using RFID: the RFID ecosystem experience. IEEE Internet Comput. 13(3), 48–55 (2009)
Perera, C., Zaslavsky, A., Christen, P., Georgakopoulos, D.: Context aware computing for the Internet of Things: a survey. IEEE Commun. Surv 16(1), 414–454 (2013)
Atzori, L., Iera, A., Morabito, G.: From `smart objects’ to `social objects’: the next evolutionary step of the internet of things. IEEE Commun. Mag. 52(1), 97–105 (2014)
Ortiz, A.M., Hussein, D., Park, S., Han, S.N., Crespi, N.: The cluster between internet of things and social networks: review and research challenges. IEEE Internet Things J. 1(3), 206–215 (2014)
Keoh, S.L., Kumar, S.S., Tschofenig, H.: Securing the internet of things: a standardization perspective. IEEE Internet Things J. 1(3), 265–275 (2014)
Chen, M., Wan, J., Li, F.: Machine-to-machine communications: architecture, standards and applications. KSII Trans. Internet Inf. Syst. 6(2), 480–497 (2012)
Kavitha, T., Sridharan, D.: Security vulnerabilities in wireless sensor networks: a survey. J. inf. assur. secur. 5, 31–44 (2010)
Al-Karaki, J.N., Kamal, A.E.: Routing techniques in wireless sensor networks: a survey. IEEE Wirel. Commun. 11(6), 6–28 (2004)
Jerbi, M., et al.: Towards efficient geographic routing in urban vehicular networks. IEEE Trans Veh. Technol 58(9), 5048–5059 (2009)
Sun, Y.L., Han, Z., Liu, K.J.: Defense of trust management vulnerabilities in distributed networks. IEEE Commun. Mag. 46(2), 112–119 (2008)
Raymond, D.R., Midkiff, S.F.: Denial of service in wireless sensor network: attacks and defenses. IEEE Pervasive Comput. 7(1), 74–81 (2008)
Qian, Y., Lu, K., Tipper, D.: A design for secure and survivable wireless sensor networks. IEEE Wirel. Commun. 14(5), 30–37 (2007)
Mohammad, A.R., Rjoub, A., Baset, A.: A low-energy security algorithm for exchanging information in wireless sensor networks. J. Inf. Assur. Secur. 4(1), 48–59 (2009)
Gendreau, A.A., Moorman, M.: “Survey of intrusion detection systems towards an end to end secure internet of things” In: proceedings of international conference on future internet of things and cloud, (2016)
Bass, T.: Intrusion detection systems and multisensor data fusion. Commun. ACM 43(4), 99–105 (2008)
Batalla, J.M., Krawiec, P.: Conception of ID layer performance at the network level for internet of things. Pers. Ubiquit. Comput. 18(2), 465–480 (2014)
Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 16(1), 266–282 (2013)
El_Deen, A., El-Sayed, A., El-Badawy, E., Gobarn, N.: Digital image encryption based on RSA algorithm. Int. J. Electro. Commun. Eng. 9(1), 69–73 (2014)
Deshmukh, S., Deshmukh, S., Patil, R.: Hybrid cryptography technique using modified diffiehellman and RSA”. Int. Comput. Sci. Inf. Technol. 5(6), 7302–7304 (2014)
Acknowledgement
National Natural Science Foundation of China (Grant: 61376028).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Guo, A., Xu, M., Ran, F. et al. A novel medical internet of things perception system based on visual image encryption and intrusion detection. Cluster Comput 22 (Suppl 6), 13405–13413 (2019). https://doi.org/10.1007/s10586-018-1944-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-018-1944-2