Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/352161
Title: | A Novel Protocol For The Security Of Internet Of Things Iot Environment |
Researcher: | Rajeesh Kumar,N V |
Guide(s): | Mohan Kumar,P |
Keywords: | Computer Science Engineering and Technology Telecommunications |
University: | Sathyabama Institute of Science and Technology |
Completed Date: | 2021 |
Abstract: | With the exponential increase of the smart devices connection, powered Internet of things (IoT) devices had revolutionized engineering, medical, and various other fields. The basic idea of employing IoT lies in the fact that it reduces time and uses minimum energy to deliver information. The IoT generally forms the massive networks that connect people and things - all share and collect data about the mode through which they are employed and their surrounding environment. All the data communicated in the IoT network has to aggregate in the Queuing Telemetry Transport protocol (QTTP) broker before stored in the server. The main challenges of IoT deal with the security issues like access control, authorization, information storage, confidentiality, authentication, system formation, and organization. newline newlineFor providing improved security to the data in powered IoT systems, three novel security frameworks are developed through Elliptical Curve Cryptography (ECC), Advanced Encryption Standard (AES), and Rivest Shamir Adleman cryptography (RSA). All the cryptic algorithms are integrated with the Constrained Queue Telemetry Transport Protocol (CQTTP) for ensuring the security of IoT data. The cryptic operations are performed during the transmission of the data from each IoT node before aggregated in the CQTTP. This cryptic operation achieves exchange of key approvals, confirmation and provides protection contrast to application data. The security of the data newline newline newline newlinelies on the key used for encryption. The size of the key is the main factor of security that provides information on how many different key values a key can in a protocol. Hence, a novel random key size approach is employed in this work to assign different sized keys for the data being transmitted from each node. Setting a variable and random key size for encryption will make the cryptography more complicated. The full spectrum of communications is encrypted using a mechanism that normally allows using TLS rather than plain TCP to avoid script XSS comma |
Pagination: | A5 |
URI: | http://hdl.handle.net/10603/352161 |
Appears in Departments: | COMPUTER SCIENCE DEPARTMENT |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01. title.pdf | Attached File | 186.49 kB | Adobe PDF | View/Open |
02. certificate.pdf | 1.27 MB | Adobe PDF | View/Open | |
03. acknowledgement.pdf | 445.66 kB | Adobe PDF | View/Open | |
04. abstract.pdf | 445.5 kB | Adobe PDF | View/Open | |
05. table of contents.pdf | 1.77 MB | Adobe PDF | View/Open | |
06. chapter 1.pdf | 2.61 MB | Adobe PDF | View/Open | |
06. chapter 2.pdf | 16.76 MB | Adobe PDF | View/Open | |
06. chapter 3.pdf | 9.72 MB | Adobe PDF | View/Open | |
06. chapter 4.pdf | 2.88 MB | Adobe PDF | View/Open | |
06. chapter 5.pdf | 7.58 MB | Adobe PDF | View/Open | |
06. chapter 6.pdf | 6.92 MB | Adobe PDF | View/Open | |
07. conclusion.pdf | 681.45 kB | Adobe PDF | View/Open | |
08. referneces.pdf | 7 MB | Adobe PDF | View/Open | |
09. curriculam vitae.pdf | 337.91 kB | Adobe PDF | View/Open | |
10. evaluation reports.pdf | 6.58 MB | Adobe PDF | View/Open | |
80_recommendation.pdf | 186.49 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: