Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/262440
Title: | To Investigate Security and Privacy of the Internet of Things to Find an Integrated Solutions |
Researcher: | Ahmed Mohammed Ibrahim Al-Kuhlani |
Guide(s): | Thorat S B |
Keywords: | Computer science |
University: | Swami Ramanand Teerth Marathwada University |
Completed Date: | 05/03/2019 |
Abstract: | Internet of Things (IoT) creates a worldwide network of interconnected objects or things that will have an active role in the Future Internet (FI). Such things will be readable, recognizable, locatable, addressable, and/or controllable via the Internet, expectations say that by 2020 there will be 50 billion devices connected to the internet, and hence the number of applications and services are expected to be numerous. In order for the IoT to be widely adopted by people and business industry, there should be a trust in the IoT security infrastructure. It is very important to define how the IoT things could efficiently and securely communicate and exchange information among themselves and with remote servers. newlineIoT brings new security and privacy challenges that have to be considered for the design of security solutions, the heterogeneous nature of IoT communications and imbalance in resources capabilities between IoT devices make it challenging to provide the required end-to-end secured connections. Most of IoT devices have limited capabilities in term of computing power, energy, and memory; and therefore, narrowed the potential choices of security solutions because many established security mechanisms cannot be supported by low capable devices. newlineIoT requires robust security solutions that can efficiently fulfill the specific security and privacy requirements with a lightweight impact on devices resources (microcontroller, memory, energy). Therefore, in this thesis, we propose solutions for three security aspects for IoT environment. newlineThe first aspect of our work is the design of a group key establishment protocol to enable secure multicast group communication in IoT. One of the security essentials to secure IoT is to have an efficient key establishment scheme to ensure confidentiality, authentication, and integrity of data exchanged in the network with consideration of IoT devices characteristics. In order to obtain an efficient and lightweight key establishment the Slepian-Wolf secret sharing scheme with cryptograp |
Pagination: | 122p |
URI: | http://hdl.handle.net/10603/262440 |
Appears in Departments: | School of Computational Sciences |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 90.35 kB | Adobe PDF | View/Open |
02_certificate.pdf | 78.36 kB | Adobe PDF | View/Open | |
03_abstract.pdf | 108.7 kB | Adobe PDF | View/Open | |
04_declearation.pdf | 74.12 kB | Adobe PDF | View/Open | |
05_acknowledgement.pdf | 6.69 kB | Adobe PDF | View/Open | |
06_contents.pdf | 198.87 kB | Adobe PDF | View/Open | |
07_list_of_tables.pdf | 242.72 kB | Adobe PDF | View/Open | |
08_list_of_figures.pdf | 150.13 kB | Adobe PDF | View/Open | |
09_abbreviations.pdf | 7.14 kB | Adobe PDF | View/Open | |
10_chapter 1.pdf | 633.12 kB | Adobe PDF | View/Open | |
11_chapter 2.pdf | 376.13 kB | Adobe PDF | View/Open | |
12_chapter 3.pdf | 934.13 kB | Adobe PDF | View/Open | |
13_chapter 4.pdf | 776.09 kB | Adobe PDF | View/Open | |
14_chapter 5.pdf | 708.98 kB | Adobe PDF | View/Open | |
15_conclusions.pdf | 127.27 kB | Adobe PDF | View/Open | |
16_bibliography.pdf | 337.3 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: