Journal of Computer and Communications

Volume 2, Issue 7 (May 2014)

ISSN Print: 2327-5219   ISSN Online: 2327-5227

Google-based Impact Factor: 1.34  Citations  

Design and Implementation of Secure Nodes in the Based-Internet-of-Things Intelligent Household

HTML  Download Download as PDF (Size: 1143KB)  PP. 1-7  
DOI: 10.4236/jcc.2014.27001    3,100 Downloads   3,952 Views   Citations


As one of the most important uses of the Internet of things (IOT), the intelligent household is becoming more and more popular. There are many fragile nodes in the intelligent household and they are bound to encounter some potential risks of hostile attacks, such as eavesdropping, denial of service, error instructs, non-authorized access or fabrication and others. This paper presents a method of design and implement of secure nodes for the intelligent household based on the IOT technology, besides giving the hardware model of nodes, the management of key, the access authentication of network, the transmission of encrypted data, and the alarm based on intrusion detection and other security mechanisms. That is, to improve the security of the based-IOT intelligent household from the viewpoint of nodes security. A test platform is built and the results of simulation prove that the proposed method can effectively improve the security of the intelligent household from access safety and transmission security.

Cite this paper

Hu, X. , Xu, H. and Han, K. (2014) Design and Implementation of Secure Nodes in the Based-Internet-of-Things Intelligent Household. Journal of Computer and Communications, 2, 1-7. doi: 10.4236/jcc.2014.27001.

Cited by

[1] Multimedia based intelligent network big data optimization model
Multimedia Tools and Applications, 2018
[2] Research on indoor environment monitoring system based on ZigBee
[3] 基于 ZigBee 的室内空气环境监控系统设计
电子技术应用, 2015
[4] A Risk Assessment on Raspberry PI using NIST Standards
International Journal of Computer Science and Network Security (IJCSNS), 2015

Copyright © 2020 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.