Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/262440
Title: To Investigate Security and Privacy of the Internet of Things to Find an Integrated Solutions
Researcher: Ahmed Mohammed Ibrahim Al-Kuhlani
Guide(s): Thorat S B
Keywords: Computer science
University: Swami Ramanand Teerth Marathwada University
Completed Date: 05/03/2019
Abstract: Internet of Things (IoT) creates a worldwide network of interconnected objects or things that will have an active role in the Future Internet (FI). Such things will be readable, recognizable, locatable, addressable, and/or controllable via the Internet, expectations say that by 2020 there will be 50 billion devices connected to the internet, and hence the number of applications and services are expected to be numerous. In order for the IoT to be widely adopted by people and business industry, there should be a trust in the IoT security infrastructure. It is very important to define how the IoT things could efficiently and securely communicate and exchange information among themselves and with remote servers. newlineIoT brings new security and privacy challenges that have to be considered for the design of security solutions, the heterogeneous nature of IoT communications and imbalance in resources capabilities between IoT devices make it challenging to provide the required end-to-end secured connections. Most of IoT devices have limited capabilities in term of computing power, energy, and memory; and therefore, narrowed the potential choices of security solutions because many established security mechanisms cannot be supported by low capable devices. newlineIoT requires robust security solutions that can efficiently fulfill the specific security and privacy requirements with a lightweight impact on devices resources (microcontroller, memory, energy). Therefore, in this thesis, we propose solutions for three security aspects for IoT environment. newlineThe first aspect of our work is the design of a group key establishment protocol to enable secure multicast group communication in IoT. One of the security essentials to secure IoT is to have an efficient key establishment scheme to ensure confidentiality, authentication, and integrity of data exchanged in the network with consideration of IoT devices characteristics. In order to obtain an efficient and lightweight key establishment the Slepian-Wolf secret sharing scheme with cryptograp
Pagination: 122p
URI: http://hdl.handle.net/10603/262440
Appears in Departments:School of Computational Sciences

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File90.35 kBAdobe PDFView/Open
02_certificate.pdf78.36 kBAdobe PDFView/Open
03_abstract.pdf108.7 kBAdobe PDFView/Open
04_declearation.pdf74.12 kBAdobe PDFView/Open
05_acknowledgement.pdf6.69 kBAdobe PDFView/Open
06_contents.pdf198.87 kBAdobe PDFView/Open
07_list_of_tables.pdf242.72 kBAdobe PDFView/Open
08_list_of_figures.pdf150.13 kBAdobe PDFView/Open
09_abbreviations.pdf7.14 kBAdobe PDFView/Open
10_chapter 1.pdf633.12 kBAdobe PDFView/Open
11_chapter 2.pdf376.13 kBAdobe PDFView/Open
12_chapter 3.pdf934.13 kBAdobe PDFView/Open
13_chapter 4.pdf776.09 kBAdobe PDFView/Open
14_chapter 5.pdf708.98 kBAdobe PDFView/Open
15_conclusions.pdf127.27 kBAdobe PDFView/Open
16_bibliography.pdf337.3 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: