Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/401801
Full metadata record
DC FieldValueLanguage
dc.coverage.spatial
dc.date.accessioned2022-08-29T08:08:52Z-
dc.date.available2022-08-29T08:08:52Z-
dc.identifier.urihttp://hdl.handle.net/10603/401801-
dc.description.abstractA research work initiates a systematic investigation of existing material and provides resources to establish new facts related to IoT security. These facts lead to unique conclusion for thousands of embedded devices which are having limited capacity and energy-efficiency technology. IoT devices have fewer potential to store large amount of energy and limited memory capacity to store data with security keys. IoT is the collaborative approach of sensing devices and processors which uses a certain type of protocol to communication with each other. At present IoT base technologies are on huge demand for automation such as smart house management, smart health monitoring systems, etc. In addition to that IoT base technologies are raising certain questions about how to manage millions of heterogeneous and diverse category of devices from a central server. Another major challenge is security management during data transmission between smart devices and its users. In internet of things framework secure data collection and transmission is a big challenge. The present security services are insufficient to control the current security challenges which make it essential to invent the multisecurity architecture to handle the multifaceted challenges of security in an open IoT network. newlineThe aim of this research work is to assess the security challenges among IoT devices and build the finest security framework for secure communication. At present secure connectivity is a major problem for IoT devices. So traditional security mechanisms are not advisable to protect the system from different types of cyber threats. In our recommended system, security framework is divided into four layers. The first layer is element layer security which is discussed to maintain security at physical layer using message authentication code with key exchange against eavesdropping and spoofing attack.
dc.format.extent203p.
dc.languageEnglish
dc.relation
dc.rightsuniversity
dc.titleRecommending multilayer security approach for internet of things
dc.title.alternative
dc.creator.researcherSharma, Santosh Kumar
dc.subject.keywordComputer Science
dc.subject.keywordComputer Science Software Engineering
dc.subject.keywordEngineering and Technology
dc.description.note
dc.contributor.guideKhuntia, Bonomali
dc.publisher.placeBerhampur
dc.publisher.universityBerhampur University
dc.publisher.institutionDepartment of Computer Science
dc.date.registered2017
dc.date.completed2020
dc.date.awarded2021
dc.format.dimensions
dc.format.accompanyingmaterialCD
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Department of Computer Science

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File11.39 kBAdobe PDFView/Open
02_declaration.pdf472.49 kBAdobe PDFView/Open
03_certificate.pdf585.27 kBAdobe PDFView/Open
04_acknowledgement.pdf190.53 kBAdobe PDFView/Open
05_contents.pdf503.53 kBAdobe PDFView/Open
06_list of tables.pdf190.72 kBAdobe PDFView/Open
07_abstract.pdf181.4 kBAdobe PDFView/Open
08_chapter 1.pdf619.64 kBAdobe PDFView/Open
09_chapter 2.pdf1.08 MBAdobe PDFView/Open
10_chapter 3.pdf781.87 kBAdobe PDFView/Open
11_chapter 4.pdf848.38 kBAdobe PDFView/Open
12_chapter 5.pdf1.37 MBAdobe PDFView/Open
13_chapter 6.pdf1.99 MBAdobe PDFView/Open
14_chapter 7.pdf1.52 MBAdobe PDFView/Open
15_chapter 8.pdf671.55 kBAdobe PDFView/Open
16_chapter 9.pdf475.46 kBAdobe PDFView/Open
17_list of figures.pdf314.56 kBAdobe PDFView/Open
18_abbreviations.pdf191.42 kBAdobe PDFView/Open
19_references.pdf368.6 kBAdobe PDFView/Open
80_recommendation.pdf486.44 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: