Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/352161
Full metadata record
DC FieldValueLanguage
dc.coverage.spatial
dc.date.accessioned2021-12-22T06:14:25Z-
dc.date.available2021-12-22T06:14:25Z-
dc.identifier.urihttp://hdl.handle.net/10603/352161-
dc.description.abstractWith the exponential increase of the smart devices connection, powered Internet of things (IoT) devices had revolutionized engineering, medical, and various other fields. The basic idea of employing IoT lies in the fact that it reduces time and uses minimum energy to deliver information. The IoT generally forms the massive networks that connect people and things - all share and collect data about the mode through which they are employed and their surrounding environment. All the data communicated in the IoT network has to aggregate in the Queuing Telemetry Transport protocol (QTTP) broker before stored in the server. The main challenges of IoT deal with the security issues like access control, authorization, information storage, confidentiality, authentication, system formation, and organization. newline newlineFor providing improved security to the data in powered IoT systems, three novel security frameworks are developed through Elliptical Curve Cryptography (ECC), Advanced Encryption Standard (AES), and Rivest Shamir Adleman cryptography (RSA). All the cryptic algorithms are integrated with the Constrained Queue Telemetry Transport Protocol (CQTTP) for ensuring the security of IoT data. The cryptic operations are performed during the transmission of the data from each IoT node before aggregated in the CQTTP. This cryptic operation achieves exchange of key approvals, confirmation and provides protection contrast to application data. The security of the data newline newline newline newlinelies on the key used for encryption. The size of the key is the main factor of security that provides information on how many different key values a key can in a protocol. Hence, a novel random key size approach is employed in this work to assign different sized keys for the data being transmitted from each node. Setting a variable and random key size for encryption will make the cryptography more complicated. The full spectrum of communications is encrypted using a mechanism that normally allows using TLS rather than plain TCP to avoid script XSS comma
dc.format.extentA5
dc.languageEnglish
dc.relation
dc.rightsuniversity
dc.titleA Novel Protocol For The Security Of Internet Of Things Iot Environment
dc.title.alternative
dc.creator.researcherRajeesh Kumar,N V
dc.subject.keywordComputer Science
dc.subject.keywordEngineering and Technology
dc.subject.keywordTelecommunications
dc.description.note
dc.contributor.guideMohan Kumar,P
dc.publisher.placeChennai
dc.publisher.universitySathyabama Institute of Science and Technology
dc.publisher.institutionCOMPUTER SCIENCE DEPARTMENT
dc.date.registered2015
dc.date.completed2021
dc.date.awarded2021
dc.format.dimensions205
dc.format.accompanyingmaterialDVD
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:COMPUTER SCIENCE DEPARTMENT

Files in This Item:
File Description SizeFormat 
01. title.pdfAttached File186.49 kBAdobe PDFView/Open
02. certificate.pdf1.27 MBAdobe PDFView/Open
03. acknowledgement.pdf445.66 kBAdobe PDFView/Open
04. abstract.pdf445.5 kBAdobe PDFView/Open
05. table of contents.pdf1.77 MBAdobe PDFView/Open
06. chapter 1.pdf2.61 MBAdobe PDFView/Open
06. chapter 2.pdf16.76 MBAdobe PDFView/Open
06. chapter 3.pdf9.72 MBAdobe PDFView/Open
06. chapter 4.pdf2.88 MBAdobe PDFView/Open
06. chapter 5.pdf7.58 MBAdobe PDFView/Open
06. chapter 6.pdf6.92 MBAdobe PDFView/Open
07. conclusion.pdf681.45 kBAdobe PDFView/Open
08. referneces.pdf7 MBAdobe PDFView/Open
09. curriculam vitae.pdf337.91 kBAdobe PDFView/Open
10. evaluation reports.pdf6.58 MBAdobe PDFView/Open
80_recommendation.pdf186.49 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: