Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/334892
Title: | Augmenting Existing Security Architecture for a Smart Home Network in a View of Innovative Attacks |
Researcher: | Saxena, Utkarsh |
Guide(s): | Sodhi, J.S and Singh, Yaduveer |
Keywords: | Computer networks Computer Science Computer Science Interdisciplinary Applications Engineering and Technology Network computers |
University: | Amity University, Noida |
Completed Date: | 2020 |
Abstract: | Security is an essential parameter for the development of a Smart Home network. The IoT network is different from the standard network and thus, the network still suffers from privacy and security vulnerabilities. Conventional security policies or approaches are not applicable to IoT, mainly due to its decentralized topology and the resource constraints of the majority of its devices. This is the main reason that software industries are working on the security aspect of a Smart Home Network System. To increase the trust value, the smart home network must be cost-effective, interoperable, less complicated and more secure, so software developers continuously work to improve the acceptance rate of the smart home system. In this research work, these essential quality factors are identified, and among those factors, reusability is selected for further research work. This research work proposed a Secure Model for Smart Home Network System based on data security, network latency, attack mitigation and decentralized technology. This model is used to evaluate the security of Smart Home Network System using Blockchain Technology. Token Sharing Approach is also used to evaluate the network latency as this approach can take the advantages of both client-server and decentralized approach and provide better results by training the model against training data. After proposing the model, security metrics are also identified for selected factors. These metrics are used to evaluate the security of an online smart home network. Security is again evaluated for the same network from the proposed security model. Results obtained from security metrics and proposed model are also compared and it is found that the results of our proposed model are much better than existing security methodologies, which validates the proposed model. newline |
Pagination: | |
URI: | http://hdl.handle.net/10603/334892 |
Appears in Departments: | Amity School of Engineering & Technology |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 73.18 kB | Adobe PDF | View/Open |
02_certificate.pdf | 153.71 kB | Adobe PDF | View/Open | |
03_priliminary pages.pdf | 224.19 kB | Adobe PDF | View/Open | |
04_chapter 1.pdf | 182.92 kB | Adobe PDF | View/Open | |
05_chapter 2.pdf | 305.17 kB | Adobe PDF | View/Open | |
06_chapter 3.pdf | 1.42 MB | Adobe PDF | View/Open | |
07_chapter 4.pdf | 978.13 kB | Adobe PDF | View/Open | |
08_chapter 5.pdf | 791.58 kB | Adobe PDF | View/Open | |
09_chapter 6.pdf | 80.07 kB | Adobe PDF | View/Open | |
10_reference.pdf | 199.77 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 152.23 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: