Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

A new approach to secure internet of things(IoT) devices using encryption and anonymity capabilities of The Onion Router (TOR)

Author : Skanda Kumar.B 1 Nandan goud.B 2

Date of Publication :30th November 2017

Abstract: A new revolution of the Internet is the Internet of things (IoT) where various devices and systems are connected to leverage data anywhere, anytime that is expected to spread rapidly, over the coming years.it is estimated that IOT is beneficial for smart home devices as nearly 40 billion connected devices are expected to be in use by 2020 but the biggest problem with such it devices is with limited functionalities is the security. Securing communications between devices and their back-end systems is one of the most severe problems. In some specific IoT cases, VPN can handle the secure connection, but VPN is not always possible. Hence there Is an immediate need for better technologies and innovative methods through which the hot network security can be greatly enhanced by using The Onion Router(TOR )By default, all traffic in the Tor network is encrypted and the identities and locations of traffic sources are very effectively concealed. Thanks to this, someone intercepting traffic from Tor networks is neither able to identify the sender nor view or alter the messages. These features would be useful when securing an IoT system. Tor network is commonly considered only something which is criminal. in this paper the author is trying to look TOR objectively which is perfectly legal and show its positives uses like securing IoT devices preventing any future catastrophic large-scale cyber attacks.

Reference :

    1. ITheTor Project, "Tor: Documentation", Torproject.org, 2017. [Online]. Available: https : // www.torproject. Org /docs /documentation.html.e n
    2. D. McCoy, K. Bauer, D. Grunwald, T. Kohno and D. Sicker, "Shining Light in Dark Places: Understanding the Tor Network", Privacy Enhancing Technologies, pp. 63-76.
    3. Atzori, L., Iera, A. and Morabito, G. (2010). The Internet of Things: A survey. Computer Networks, 54(15), pp.2787- 2805.
    4. B. Borowicz, "Simplifying IoT: Connecting, Commissioning, and Controlling with Near Field Communication (NFC) - Grid Connect Blog," Grid Connect Blog, 2017.
    5. M. Schurgot, D. Shinberg and L. Greenwald, "Experiments with security and privacy in IoT networks", 2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2015.
    6. M. Patton, E. Gross, R. Chinn, S. Forbis, L. Walker and H. Chen, "Uninvited Connections: A Study of Vulnerable Devices on the Internet of Things (IoT)", 2014 IEEE Joint Intelligence and Security Informatics Conference, 2014.
    7. A. Chaabane, P. Manils and M. Kaafar, "Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network", 2010 Fourth International Conference on Network and System Security, 2010.
    8. A. Greenberg, A. Greenberg, L. Newman, L. Newman, A. Greenberg, B. Barrett, A. Greenberg and C. Bozelko, "Now You Can Hide Your Smart Home on the Darknet", WIRED, 2017.
    9. Carrie MacGillivray, Vernon Turner, Denise Lund, Worldwide Internet of Things (IoT) 2013–2020 Forecast: Billions of Things, Trillions of Dollars. International Data Corporation, 2014. Available:

Recent Article