Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/352161
Title: A Novel Protocol For The Security Of Internet Of Things Iot Environment
Researcher: Rajeesh Kumar,N V
Guide(s): Mohan Kumar,P
Keywords: Computer Science
Engineering and Technology
Telecommunications
University: Sathyabama Institute of Science and Technology
Completed Date: 2021
Abstract: With the exponential increase of the smart devices connection, powered Internet of things (IoT) devices had revolutionized engineering, medical, and various other fields. The basic idea of employing IoT lies in the fact that it reduces time and uses minimum energy to deliver information. The IoT generally forms the massive networks that connect people and things - all share and collect data about the mode through which they are employed and their surrounding environment. All the data communicated in the IoT network has to aggregate in the Queuing Telemetry Transport protocol (QTTP) broker before stored in the server. The main challenges of IoT deal with the security issues like access control, authorization, information storage, confidentiality, authentication, system formation, and organization. newline newlineFor providing improved security to the data in powered IoT systems, three novel security frameworks are developed through Elliptical Curve Cryptography (ECC), Advanced Encryption Standard (AES), and Rivest Shamir Adleman cryptography (RSA). All the cryptic algorithms are integrated with the Constrained Queue Telemetry Transport Protocol (CQTTP) for ensuring the security of IoT data. The cryptic operations are performed during the transmission of the data from each IoT node before aggregated in the CQTTP. This cryptic operation achieves exchange of key approvals, confirmation and provides protection contrast to application data. The security of the data newline newline newline newlinelies on the key used for encryption. The size of the key is the main factor of security that provides information on how many different key values a key can in a protocol. Hence, a novel random key size approach is employed in this work to assign different sized keys for the data being transmitted from each node. Setting a variable and random key size for encryption will make the cryptography more complicated. The full spectrum of communications is encrypted using a mechanism that normally allows using TLS rather than plain TCP to avoid script XSS comma
Pagination: A5
URI: http://hdl.handle.net/10603/352161
Appears in Departments:COMPUTER SCIENCE DEPARTMENT

Files in This Item:
File Description SizeFormat 
01. title.pdfAttached File186.49 kBAdobe PDFView/Open
02. certificate.pdf1.27 MBAdobe PDFView/Open
03. acknowledgement.pdf445.66 kBAdobe PDFView/Open
04. abstract.pdf445.5 kBAdobe PDFView/Open
05. table of contents.pdf1.77 MBAdobe PDFView/Open
06. chapter 1.pdf2.61 MBAdobe PDFView/Open
06. chapter 2.pdf16.76 MBAdobe PDFView/Open
06. chapter 3.pdf9.72 MBAdobe PDFView/Open
06. chapter 4.pdf2.88 MBAdobe PDFView/Open
06. chapter 5.pdf7.58 MBAdobe PDFView/Open
06. chapter 6.pdf6.92 MBAdobe PDFView/Open
07. conclusion.pdf681.45 kBAdobe PDFView/Open
08. referneces.pdf7 MBAdobe PDFView/Open
09. curriculam vitae.pdf337.91 kBAdobe PDFView/Open
10. evaluation reports.pdf6.58 MBAdobe PDFView/Open
80_recommendation.pdf186.49 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: