Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/401801
Title: Recommending multilayer security approach for internet of things
Researcher: Sharma, Santosh Kumar
Guide(s): Khuntia, Bonomali
Keywords: Computer Science
Computer Science Software Engineering
Engineering and Technology
University: Berhampur University
Completed Date: 2020
Abstract: A research work initiates a systematic investigation of existing material and provides resources to establish new facts related to IoT security. These facts lead to unique conclusion for thousands of embedded devices which are having limited capacity and energy-efficiency technology. IoT devices have fewer potential to store large amount of energy and limited memory capacity to store data with security keys. IoT is the collaborative approach of sensing devices and processors which uses a certain type of protocol to communication with each other. At present IoT base technologies are on huge demand for automation such as smart house management, smart health monitoring systems, etc. In addition to that IoT base technologies are raising certain questions about how to manage millions of heterogeneous and diverse category of devices from a central server. Another major challenge is security management during data transmission between smart devices and its users. In internet of things framework secure data collection and transmission is a big challenge. The present security services are insufficient to control the current security challenges which make it essential to invent the multisecurity architecture to handle the multifaceted challenges of security in an open IoT network. newlineThe aim of this research work is to assess the security challenges among IoT devices and build the finest security framework for secure communication. At present secure connectivity is a major problem for IoT devices. So traditional security mechanisms are not advisable to protect the system from different types of cyber threats. In our recommended system, security framework is divided into four layers. The first layer is element layer security which is discussed to maintain security at physical layer using message authentication code with key exchange against eavesdropping and spoofing attack.
Pagination: 203p.
URI: http://hdl.handle.net/10603/401801
Appears in Departments:Department of Computer Science

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File11.39 kBAdobe PDFView/Open
02_declaration.pdf472.49 kBAdobe PDFView/Open
03_certificate.pdf585.27 kBAdobe PDFView/Open
04_acknowledgement.pdf190.53 kBAdobe PDFView/Open
05_contents.pdf503.53 kBAdobe PDFView/Open
06_list of tables.pdf190.72 kBAdobe PDFView/Open
07_abstract.pdf181.4 kBAdobe PDFView/Open
08_chapter 1.pdf619.64 kBAdobe PDFView/Open
09_chapter 2.pdf1.08 MBAdobe PDFView/Open
10_chapter 3.pdf781.87 kBAdobe PDFView/Open
11_chapter 4.pdf848.38 kBAdobe PDFView/Open
12_chapter 5.pdf1.37 MBAdobe PDFView/Open
13_chapter 6.pdf1.99 MBAdobe PDFView/Open
14_chapter 7.pdf1.52 MBAdobe PDFView/Open
15_chapter 8.pdf671.55 kBAdobe PDFView/Open
16_chapter 9.pdf475.46 kBAdobe PDFView/Open
17_list of figures.pdf314.56 kBAdobe PDFView/Open
18_abbreviations.pdf191.42 kBAdobe PDFView/Open
19_references.pdf368.6 kBAdobe PDFView/Open
80_recommendation.pdf486.44 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: