Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/419375
Title: | Trustbased security Mechanisms for internet of battlefield things iobt Environment |
Researcher: | T Janani |
Guide(s): | S Veni |
Keywords: | Computer Science Computer Science Information Systems Engineering and Technology |
University: | Karpagam University |
Completed Date: | 2021 |
Abstract: | Internet of Things (IoT) is the latest trend that incorporates many technologies in it. People are gradually entering into the IoT era where communication takes place between humans and objects and between objects themselves. The IoT brings a new aspect in Information and Communication Technology (ICT) that associate everyone from every location at any time. It integrate the real world with the data world. The advent of ICT and Radio Frequency Identification (RFID) enables the IoT to become very popular with humans. newlineIt is a rapidly developing framework, where conventional networked objects are connected with the physical entities including home appliances, vehicles, battlefield things, industrial things, etc. Smart entities (also called quotthingsquot) can sense other objects which are close to them and also exchange information with one another with the help of the internet. The significant elements of the IoT is the wireless sensor that accumulate information from the circumstances and controls the same if it needs any modification. Most of the applications offers novel innovative services or improves the effectiveness of the existent one. Such applications are disaster management, smart health, environmental monitoring, industrial, agriculture, battlefield surveillance, etc. Among these, the Internet of Battlefield Things (IoBT) application is getting more attention due to its open and unattended environment. newlineDue to the significant characteristics, the IoT is suitable for group-based communication like battlefield networks. It plays an essential role in the battlefield to interconnect various IoBT nodes to communicate with each other. Many battlefield things like combat equipment, war-fighters, vehicles, smart-watches, and smart-spectacles are attached with sensors to accumulate the data from the battlefield network and transfer this information to the responsible person/object to make a real-time decision on military applications. This information should be reliable and secured for a successful mission. |
Pagination: | |
URI: | http://hdl.handle.net/10603/419375 |
Appears in Departments: | Computer Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
80_recommendation.pdf | Attached File | 181.5 kB | Adobe PDF | View/Open |
bonafide certificate.pdf | 158.63 kB | Adobe PDF | View/Open | |
certificate.pdf | 159.09 kB | Adobe PDF | View/Open | |
chapter 1.pdf | 691.78 kB | Adobe PDF | View/Open | |
chapter 2.pdf | 302.57 kB | Adobe PDF | View/Open | |
chapter 3.pdf | 616.62 kB | Adobe PDF | View/Open | |
chapter 4.pdf | 650.42 kB | Adobe PDF | View/Open | |
chapter 5.pdf | 639.34 kB | Adobe PDF | View/Open | |
chapter 6.pdf | 675.79 kB | Adobe PDF | View/Open | |
declaration.pdf | 159.06 kB | Adobe PDF | View/Open | |
front page.pdf | 227.14 kB | Adobe PDF | View/Open | |
table of contents.pdf | 411.14 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: