Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/558987
Title: Design and Development of an Efficient Security Scheme for Distributed IoT Networks based on Blockchain and Cellular Automata
Researcher: Fasila, K A
Guide(s): Mathew, Sheena
Keywords: Block chain
Cellular Automata
Computer Science
Computer Science Information Systems
Electronic Health Record Management
Engineering and Technology
Internet of Things
SCADBIN
University: Cochin University of Science and Technology
Completed Date: 2023
Abstract: Internet of Things (IoT) made an impact worldwide in recent years by changing the newlinemode of day to day life. It contributes to almost all areas, beginning from the basic newlineapplications of a common man and extends upto critical areas such as battlefields in newlinemilitary applications. Hence, it is unavoidable to protect the data that are being evolved, newlinetransmitted and accessed in IoT applications. The data collected by the sensors are newlineprocessed to produce useful information. A lot of research works have been done to newlineprovide protection in IoT based systems. But, existing algorithms in such networks are newlinenot considering and ensuring all the security objectives. Starting from the sensing of newlinedata from IoT environment, the data have to be protected from several types of attacks. newlineAlso, the authentication of involved entities, integrity of data, access control and newlineconfidentiality are to be achieved. This work proposes a novel security architecture for newlineIoT-based distributed applications. The architecture uses the best known lightweight newlinecipher ChaCha-20. More security and randomness are attained by applying principles newlineof cellular automata for the random number generation. Multilevel protection of data is newlineensured by double encryption during the data uploading and storing phases. The method newlineis also proved to be secure by providing encryption based on dynamic session keys. Internet of Things (IoT) made an impact worldwide in recent years by changing the newlinemode of day to day life. It contributes to almost all areas, beginning from the basic newlineapplications of a common man and extends upto critical areas such as battlefields in newlinemilitary applications. Hence, it is unavoidable to protect the data that are being evolved, newlinetransmitted and accessed in IoT applications. The data collected by the sensors are newlineprocessed to produce useful information. A lot of research works have been done to newlineprovide protection in IoT based systems. But, existing algorithms in such networks are newlinenot considering and ensuring all the security objectives.
Pagination: xvii,159
URI: http://hdl.handle.net/10603/558987
Appears in Departments:Department of Computer Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File44.38 kBAdobe PDFView/Open
02 -preliminary pages.pdf186.18 kBAdobe PDFView/Open
03_content.pdf16.25 kBAdobe PDFView/Open
04_abstract.pdf6.36 kBAdobe PDFView/Open
05_chapter1.pdf273.8 kBAdobe PDFView/Open
06_chapter2.pdf267.32 kBAdobe PDFView/Open
07_chapter3.pdf518.57 kBAdobe PDFView/Open
08_chapter4.pdf411.75 kBAdobe PDFView/Open
09_chapter5.pdf537.17 kBAdobe PDFView/Open
10_chapter6.pdf515.49 kBAdobe PDFView/Open
11_chapter7.pdf450.22 kBAdobe PDFView/Open
12_chapter8.pdf155.34 kBAdobe PDFView/Open
13_annexures.pdf460.72 kBAdobe PDFView/Open
80_recommendation.pdf197.5 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: