Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/419375
Title: Trustbased security Mechanisms for internet of battlefield things iobt Environment
Researcher: T Janani
Guide(s): S Veni
Keywords: Computer Science
Computer Science Information Systems
Engineering and Technology
University: Karpagam University
Completed Date: 2021
Abstract: Internet of Things (IoT) is the latest trend that incorporates many technologies in it. People are gradually entering into the IoT era where communication takes place between humans and objects and between objects themselves. The IoT brings a new aspect in Information and Communication Technology (ICT) that associate everyone from every location at any time. It integrate the real world with the data world. The advent of ICT and Radio Frequency Identification (RFID) enables the IoT to become very popular with humans. newlineIt is a rapidly developing framework, where conventional networked objects are connected with the physical entities including home appliances, vehicles, battlefield things, industrial things, etc. Smart entities (also called quotthingsquot) can sense other objects which are close to them and also exchange information with one another with the help of the internet. The significant elements of the IoT is the wireless sensor that accumulate information from the circumstances and controls the same if it needs any modification. Most of the applications offers novel innovative services or improves the effectiveness of the existent one. Such applications are disaster management, smart health, environmental monitoring, industrial, agriculture, battlefield surveillance, etc. Among these, the Internet of Battlefield Things (IoBT) application is getting more attention due to its open and unattended environment. newlineDue to the significant characteristics, the IoT is suitable for group-based communication like battlefield networks. It plays an essential role in the battlefield to interconnect various IoBT nodes to communicate with each other. Many battlefield things like combat equipment, war-fighters, vehicles, smart-watches, and smart-spectacles are attached with sensors to accumulate the data from the battlefield network and transfer this information to the responsible person/object to make a real-time decision on military applications. This information should be reliable and secured for a successful mission.
Pagination: 
URI: http://hdl.handle.net/10603/419375
Appears in Departments:Computer Science

Files in This Item:
File Description SizeFormat 
80_recommendation.pdfAttached File181.5 kBAdobe PDFView/Open
bonafide certificate.pdf158.63 kBAdobe PDFView/Open
certificate.pdf159.09 kBAdobe PDFView/Open
chapter 1.pdf691.78 kBAdobe PDFView/Open
chapter 2.pdf302.57 kBAdobe PDFView/Open
chapter 3.pdf616.62 kBAdobe PDFView/Open
chapter 4.pdf650.42 kBAdobe PDFView/Open
chapter 5.pdf639.34 kBAdobe PDFView/Open
chapter 6.pdf675.79 kBAdobe PDFView/Open
declaration.pdf159.06 kBAdobe PDFView/Open
front page.pdf227.14 kBAdobe PDFView/Open
table of contents.pdf411.14 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: