Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/334892
Title: Augmenting Existing Security Architecture for a Smart Home Network in a View of Innovative Attacks
Researcher: Saxena, Utkarsh
Guide(s): Sodhi, J.S and Singh, Yaduveer
Keywords: Computer networks
Computer Science
Computer Science Interdisciplinary Applications
Engineering and Technology
Network computers
University: Amity University, Noida
Completed Date: 2020
Abstract: Security is an essential parameter for the development of a Smart Home network. The IoT network is different from the standard network and thus, the network still suffers from privacy and security vulnerabilities. Conventional security policies or approaches are not applicable to IoT, mainly due to its decentralized topology and the resource constraints of the majority of its devices. This is the main reason that software industries are working on the security aspect of a Smart Home Network System. To increase the trust value, the smart home network must be cost-effective, interoperable, less complicated and more secure, so software developers continuously work to improve the acceptance rate of the smart home system. In this research work, these essential quality factors are identified, and among those factors, reusability is selected for further research work. This research work proposed a Secure Model for Smart Home Network System based on data security, network latency, attack mitigation and decentralized technology. This model is used to evaluate the security of Smart Home Network System using Blockchain Technology. Token Sharing Approach is also used to evaluate the network latency as this approach can take the advantages of both client-server and decentralized approach and provide better results by training the model against training data. After proposing the model, security metrics are also identified for selected factors. These metrics are used to evaluate the security of an online smart home network. Security is again evaluated for the same network from the proposed security model. Results obtained from security metrics and proposed model are also compared and it is found that the results of our proposed model are much better than existing security methodologies, which validates the proposed model. newline
Pagination: 
URI: http://hdl.handle.net/10603/334892
Appears in Departments:Amity School of Engineering & Technology

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File73.18 kBAdobe PDFView/Open
02_certificate.pdf153.71 kBAdobe PDFView/Open
03_priliminary pages.pdf224.19 kBAdobe PDFView/Open
04_chapter 1.pdf182.92 kBAdobe PDFView/Open
05_chapter 2.pdf305.17 kBAdobe PDFView/Open
06_chapter 3.pdf1.42 MBAdobe PDFView/Open
07_chapter 4.pdf978.13 kBAdobe PDFView/Open
08_chapter 5.pdf791.58 kBAdobe PDFView/Open
09_chapter 6.pdf80.07 kBAdobe PDFView/Open
10_reference.pdf199.77 kBAdobe PDFView/Open
80_recommendation.pdf152.23 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: