Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/444680
Full metadata record
DC FieldValueLanguage
dc.coverage.spatialall
dc.date.accessioned2023-01-13T04:59:51Z-
dc.date.available2023-01-13T04:59:51Z-
dc.identifier.urihttp://hdl.handle.net/10603/444680-
dc.description.abstractnewline ABSTRACT newlineIn the world of information technology, the term quotInternet of Thingsquot (IoT) appears to be a catchphrase. The term has gained in prominence over the previous decade and has had a significant impact on our lives. Today, the Internet of Things is transforming practically every sphere of activity. The Internet of Things (IoT) is envisioned as a network of billions of interconnected objects. The Internet of Things aims to bring all of the devices together under one roof. At any time, these devices can be watched and managed. They are able to communicate, exchange information, and carry out the tasks that have been assigned to them. newlineIoT is a dynamic global network infrastructure that can identify, control, and monitor every object on the entire globe via the internet, according to a particular agreement protocol, and through the interconnection of physical and virtual things based on information and communication technology interoperability. Advances in the computing paradigm of the Internet of Things (IoT) have made it a common solution in many fields, including smart cities, connected vehicles, intelligent farming, and so on, which offers significant economic benefits, reduced usage of energy, smart environments and increased share of energy among other benefits. newlineDue to the heterogeneous and resource-constrained nature of IoT devices, one of the key challenges that IoT faces is security. Furthermore, most traditional security approaches for both Internet and IoT-based systems rely on a centralised trusted authority, making them vulnerable to a wide range of attacks, including single point of failure and spoofing. newlineHowever, the safety concerns emerging from the networking scale and resource heterogeneity in IoT make it a hot target for attackers, where the centralized protection solutions are limited. The internet collects and transmits a vast number of data from different all over the world. IoT comprises heterogeneous machines operating over a wide variety of networks and transmitting a vast vo
dc.format.extent12
dc.languageEnglish
dc.relation212
dc.rightsuniversity
dc.titleDesign a New Technique for Secure Data Transmission on IoT Network Using Blockchain
dc.title.alternativeDesign a New Technique for Secure Data Transmission on IoT Network Using Blockchain
dc.creator.researcherRashmeet Kaur
dc.subject.keywordComputer Science
dc.subject.keywordComputer Science Software Engineering
dc.subject.keywordEngineering and Technology
dc.description.note12
dc.contributor.guideDr Aleem ali
dc.publisher.placeSaharanpur
dc.publisher.universityGlocal University
dc.publisher.institutioncomputer science and engineering
dc.date.registered2018
dc.date.completed2023
dc.date.awarded2023
dc.format.dimensionsna
dc.format.accompanyingmaterialNone
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:computer science and engineering

Files in This Item:
File Description SizeFormat 
80_recommendation.pdfAttached File33.68 kBAdobe PDFView/Open
abstract.pdf12.79 kBAdobe PDFView/Open
chapter 1.pdf879.12 kBAdobe PDFView/Open
chapter 4.pdf436.73 kBAdobe PDFView/Open
contents - rasmeet thesis - 15.11.2022 (1).pdf52.62 kBAdobe PDFView/Open
first_page.pdf26.96 kBAdobe PDFView/Open
references.pdf525.69 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: