ARO_EDGE: A Technique to Ensure Data Security in Internet of Things (IoT)


  • A. Vithya Vijayalakshmi Ph.D. Scholar, Department of Computer Science, St. Joseph’s College (Autonomous), Tiruchirappalli, Tamil Nadu, India
  • L. Arockiam Associate Professor, Department of Computer Science, St. Joseph’s College (Autonomous), Tiruchirappalli, Tamil Nadu, India



Internet of Things, Smart Healthcare, Data Security, Obfuscation Technique


Recently, e-health care, smart home, smart city, smart car and smart car services have been receiving attention all over the world. In smart health care, there are many sensors are communicating between each other and connected to the global network connection. Therefore, there is a problem in securing the data sensed from the various medical IoT devices. Lightweight and efficient way of providing secure communication in the IoT are the need of the hour. To overcome this problem, a technique has been proposed. This paper proposes a confidentiality technique, named ARO_EDGE to secure the data in IoT devices. This proposed confidentiality technique is based on data obfuscation technique to prevent the data from the attackers and unauthorized users.


Maire O’Neill, “Insecurity by Design: Today’s IoT Device Security Problem”, Elsevier, 2016, Vol. 2, Iss. 1, pp. 48 & 49.

A.Vithya Vijayalakshmi and Dr. L. Arockiam, “A Study on Security Issues and Challenges in IoT”, International Journal of Engineering Sciences & Management Research, 2016, ISSN 2349-6193, Vol. 3, Iss. 11, pp. 1-9.

Saurabh Sing and Pradip Sharma, Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions”, Journal of Ambient Intelligence and Humanized Computing, 2017, Springer, pp. 1-18, DOI: 10.1007/s12652-017-0494-4.

Lobna Yehia, Ayman Khedr and Ashraf Darwish, “Hybrid Security Techniques for Internet of Things Healthcare Applications”, Advances in Internet of Things, 2015, Vol. 5, pp. 21-25.

Amirhossein Safi, “Improving the Security of Internet of Things using Encryption Algorithms”, International Journal of Computer and Information Engineering, 2017, Vol. 11, No. 5, pp. 540-543.

Salvador Perez, Jose, Hernández-ramos, Sara N. Matheu-garcía, Domenico Rotondi, Antonio F. Skarmeta, Leonardo Straniero, and Diego Pedone, “A lightweight and flexible encryption scheme to protect sensitive data in Smart Building scenarios”, IEEE, 2016, Vol. 4, pp. 8956 – 8977, DOI: 10.1109/ACCESS.2017.2695525.

Zhen-Yu Hong, Zhong-Pan Qiu, Si-Liang Zeng, Shui-De Wang and Mukase Sandrine, “Research on Fusion Encryption Algorithm for Internet of Things Monitoring Equipment”, IEEE, International Conference on Frontier of Computer Science and Technology, 2017, ISSN: 2375-527X, pp. 425-429.

Vermesan, O. and Friess, P. “Internet of Things Applications – From Research and Innovation to Market Deployment”, 2014 (River Publishers Series in Communications).

Kashif Saleem, Abdelouahid Derhab, Jalal Al-Muhtadi and Basit Shahzad, “Human-oriented design of secure Machine-to-Machine

communication system for e-Healthcare society”, Elsevier, Computers in Human Behavior, 2014, Vol. 54, pp. 977-985.

Dharmendra Singh Rajput and Rakesh Gour, “An IoT Framework for Healthcare Monitoring Systems”, International Journal of Computer Science and Information Security, 2016, ISSN 1947-5500. Vol. 14 No. 5, pp. 1-5.




How to Cite

Vithya Vijayalakshmi, A., & Arockiam, L. (2018). ARO_EDGE: A Technique to Ensure Data Security in Internet of Things (IoT). Asian Journal of Computer Science and Technology, 7(2), 52–56.