Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/401801
Title: | Recommending multilayer security approach for internet of things |
Researcher: | Sharma, Santosh Kumar |
Guide(s): | Khuntia, Bonomali |
Keywords: | Computer Science Computer Science Software Engineering Engineering and Technology |
University: | Berhampur University |
Completed Date: | 2020 |
Abstract: | A research work initiates a systematic investigation of existing material and provides resources to establish new facts related to IoT security. These facts lead to unique conclusion for thousands of embedded devices which are having limited capacity and energy-efficiency technology. IoT devices have fewer potential to store large amount of energy and limited memory capacity to store data with security keys. IoT is the collaborative approach of sensing devices and processors which uses a certain type of protocol to communication with each other. At present IoT base technologies are on huge demand for automation such as smart house management, smart health monitoring systems, etc. In addition to that IoT base technologies are raising certain questions about how to manage millions of heterogeneous and diverse category of devices from a central server. Another major challenge is security management during data transmission between smart devices and its users. In internet of things framework secure data collection and transmission is a big challenge. The present security services are insufficient to control the current security challenges which make it essential to invent the multisecurity architecture to handle the multifaceted challenges of security in an open IoT network. newlineThe aim of this research work is to assess the security challenges among IoT devices and build the finest security framework for secure communication. At present secure connectivity is a major problem for IoT devices. So traditional security mechanisms are not advisable to protect the system from different types of cyber threats. In our recommended system, security framework is divided into four layers. The first layer is element layer security which is discussed to maintain security at physical layer using message authentication code with key exchange against eavesdropping and spoofing attack. |
Pagination: | 203p. |
URI: | http://hdl.handle.net/10603/401801 |
Appears in Departments: | Department of Computer Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 11.39 kB | Adobe PDF | View/Open |
02_declaration.pdf | 472.49 kB | Adobe PDF | View/Open | |
03_certificate.pdf | 585.27 kB | Adobe PDF | View/Open | |
04_acknowledgement.pdf | 190.53 kB | Adobe PDF | View/Open | |
05_contents.pdf | 503.53 kB | Adobe PDF | View/Open | |
06_list of tables.pdf | 190.72 kB | Adobe PDF | View/Open | |
07_abstract.pdf | 181.4 kB | Adobe PDF | View/Open | |
08_chapter 1.pdf | 619.64 kB | Adobe PDF | View/Open | |
09_chapter 2.pdf | 1.08 MB | Adobe PDF | View/Open | |
10_chapter 3.pdf | 781.87 kB | Adobe PDF | View/Open | |
11_chapter 4.pdf | 848.38 kB | Adobe PDF | View/Open | |
12_chapter 5.pdf | 1.37 MB | Adobe PDF | View/Open | |
13_chapter 6.pdf | 1.99 MB | Adobe PDF | View/Open | |
14_chapter 7.pdf | 1.52 MB | Adobe PDF | View/Open | |
15_chapter 8.pdf | 671.55 kB | Adobe PDF | View/Open | |
16_chapter 9.pdf | 475.46 kB | Adobe PDF | View/Open | |
17_list of figures.pdf | 314.56 kB | Adobe PDF | View/Open | |
18_abbreviations.pdf | 191.42 kB | Adobe PDF | View/Open | |
19_references.pdf | 368.6 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 486.44 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: