Implementation of ARP Spoofing for IoT Devices Using Cryptography AES and ECDSA Algorithms
S. Uma Mageshwari1, R. Santhi2

1S. Uma Mageshwari, Research Scholar, R & D Centre, Bharathiar University, Coimbatore (Tamil Nadu), India.
2Dr. R. Santhi, Research Supervisor, Bharathiar University, Coimbatore (Tamil Nadu), India.
Manuscript received on 17 October 2019 | Revised Manuscript received on 25 October 2019 | Manuscript Published on 02 November 2019 | PP: 2889-2893 | Volume-8 Issue-2S11 September 2019 | Retrieval Number: B13630982S1119/2019©BEIESP | DOI: 10.35940/ijrte.B1363.0982S1119
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: The Internet of Things is the network of numerous devices and communicate with an internet by using the IP address. The IoT objects shares the information using wireless connection. During the data transmission, that can be distorted by the Hackers by knowing their IP address. In IoT (Internet of Things), the wireless communication between the devices makes the users to be vulnerable. So, the hackers may spoof the MAC address of the communicating devices. The receiver MAC address is identified and then false MAC (Media Access Control) address is created by the hacker. Then, attackers replaces the original MAC address in the ARP (Address Resolution Protocol) table of the sender. So,the hackers may impersonate like the sender. Therefore, Cryptographic algorithms like AES (Advanced Encryption Standard) for confidentiality and ECDSA (Elliptic Curve Digital Signature Algorithm) for Authentication are applied in the proposed algorithm to safeguard the data as well as the devices from the hackers. The following attacks such as Man-in-the-Middle, Denial -of -Service (DOS) and ARP spoofing are strongly prevented in the proposed algorithm. Thus, the implementation of an algorithm is carried out in Ubuntu Linux environment with installing Python dependencies. This algorithm affords an efficient way to thwart ARP (Address Resolution Protocol) spoofing by the hackers for IoT devices.
Keywords: AES, ARP, DOS, ECDSA, IoT and Man in the Middle Attack.
Scope of the Article: IoT