IoT 19(18): e3

Research Article

Analytical Method to Improve the Security of Internet of Things with Limited Resources

Download1040 downloads
  • @ARTICLE{10.4108/eai.13-7-2018.163502,
        author={Abdul Hannan Khan and Shahan Yamin Siddiqui and Muhammad Sohail Irshad and Saif Ali and Muhammad Rehan Saleem and Shahid Iqbal},
        title={Analytical Method to Improve the Security of Internet of Things with Limited Resources},
        journal={EAI Endorsed Transactions on Internet of Things},
        keywords={Internet of Things (IoT), Design Science Research (DSR), Advanced Encryption Standard (AES), Transport Layer Security (TLS), Datagram Transport Layer Security (DTLS)},
  • Abdul Hannan Khan
    Shahan Yamin Siddiqui
    Muhammad Sohail Irshad
    Saif Ali
    Muhammad Rehan Saleem
    Shahid Iqbal
    Year: 2019
    Analytical Method to Improve the Security of Internet of Things with Limited Resources
    DOI: 10.4108/eai.13-7-2018.163502
Abdul Hannan Khan1,2,*, Shahan Yamin Siddiqui1,2, Muhammad Sohail Irshad2, Saif Ali2, Muhammad Rehan Saleem3, Shahid Iqbal4
  • 1: School of Computer Science, National College of Business Administration & Economics, Lahore, Pakistan
  • 2: Department of Computer Science, Minhaj University, Lahore, Pakistan
  • 3: Department of Computer Science, University of Management and Technology, Lahore, Punjab, Pakistan
  • 4: Department of Computer Science & IT, Virtual University of Pakistan, Lahore, Punjab, Pakistan
*Contact email:


This research is about the information security of very obliged gadgets. Design Science Research (DSR) Method is utilized for this reason. It let us pick up the fundamental thought and exploration of the primary issue space. This is a procedure of combining distinctive pre-affirmed examines to pick up the goal. Symmetric cryptography will be utilized as a noteworthy device in various information items and entryway gadgets. The principle target of this exploration is to give security to exceptionally constrained gadgets as they are not ready to convey utilizing TLS or DTLS given a deficiency of assets. This arrangement is a finished bundle to give credibility, information honesty and privacy, either information is making a trip to entryway, gadgets or the web. At the information interface layer, AES symmetric encryption is utilized and information questions likewise are encoded utilizing a similar encryption strategy. Assessment is performed using wire shark.