img Leseprobe Leseprobe

Secured Authentication System for Internet of Things

PDF
36,99
Amazon iTunes Thalia.de Weltbild.de Hugendubel Bücher.de ebook.de kobo Osiander Google Books Barnes&Noble bol.com Legimi yourbook.shop Kulturkaufhaus ebooks-center.de
* Affiliatelinks/Werbelinks
Hinweis: Affiliatelinks/Werbelinks
Links auf reinlesen.de sind sogenannte Affiliate-Links. Wenn du auf so einen Affiliate-Link klickst und über diesen Link einkaufst, bekommt reinlesen.de von dem betreffenden Online-Shop oder Anbieter eine Provision. Für dich verändert sich der Preis nicht.

GRIN Verlag img Link Publisher

Naturwissenschaften, Medizin, Informatik, Technik / Informatik

Beschreibung

Academic Paper from the year 2024 in the subject Computer Sciences - Internet of Things, IOT, grade: A, Free University of Berlin (The National Institute of Engineering, Mysore), course: Ph.D, language: English, abstract: The key objectives defined in this thesis are given as follows: To analyse the different security breaches in the IoT Ecosystem. To develop a lightweight cryptographic scheme for secured Authentication in IoT. To develop a multilevel security model by using Enhanced Cryptosystem for secured Authentication in IoT. To ensure reliable and secure communication and access across multiple co-operatively communicating devices in IoT ecosystems ensuring optimal security and authentication system is must. Though, IoT demands ensuring security and authentication for both “device level security” and “data security under communication”. Noticeably, the device level security addresses attack resilience from any unwanted or unexpected intruder by applying certain authentication variables or key agreement policies. However, in the last few years, the events pertaining to smart card loss attack (SCLA), Brute-Force attack, impersonation attack, data sniffing attack etc., have questioned major at-hand security solutions. The irony is, in the majority of IoT systems, the access information or the key agreement information is saved or preserved onto the local memory, which often broadens the horizon for data loss, or attack. In such classical approaches the possibility of SCLA, Impersonation and Brute-force attack can’t be neglected. And therefore, ensuring both system level access authentication is inevitable. In other words, strengthening data security in IoT systems is equally significant like device level security and authentication. Once system considers both data level security as well as device level authentication system retaining quality of content and hardware efficiency becomes equally inevitable. On the other hand, maintaining efficacy of the security system with higher authentication correctness amongst the gateways and communication devices is must. It demands a collaborative low-cost or lightweight security model to enable security while maintaining IoT- expectations like low-computation, lightweight computation, low-power consumption, better data quality, attack resilience and fast in response. It can be considered as the key driving force behind this research.

Weitere Titel in dieser Kategorie
Cover Cyber Operations
Jerry M. Couretas
Cover Cyber Operations
Jerry M. Couretas

Kundenbewertungen

Schlagwörter

Attestation and Authentication, Protocol, AAoT, Ada, Boost, AES, Advanced Encryption, Assisted Living, AAL, Ambient, ABE, Attribute Based Encryption, ADAB, Standard Ambient, Living, Assisted