Please use this identifier to cite or link to this item: http://dspace.dtu.ac.in:8080/jspui/handle/repository/15831
Title: A FUZZY BASED METHODOLOGY TO IMPLEMENT SECURITY IN INTERNET OF THINGS
Authors: PUNIA, AANCHAL
Keywords: INTERNET OF THINGS
THREAT PRIORITIZATION
SECURITY INDEX
FUZZY LOGIC
RISK
Issue Date: Jul-2017
Series/Report no.: TD-2805;
Abstract: Internet has become a necessity today because of the technological advancement. With the needs of connecting everything and anything, Internet of Things (IoT) comes to the picture. IoT can be defined as "a dynamic global network infrastructure." IoT has changed the way we think, live and work. IoT is making the whole world a connected web. One can control, track and manage the things/objects/business by sitting miles away. Also, data can be accessed anytime and anywhere. IoT is a network of heterogeneous networks connecting together via the internet. IoT is evolving at a rapid pace. Everything has downsides, and IoT is facing the biggest challenges of security and privacy. Thus, the exponentially growing popularity of IoT needs a security check. Any breakdown in security of IoT will put the connected objects and human lives at risk. With the increase in the size of IoT, the number of objects/things at stake will also rise. Intercommunicating smart devices provide real-time responses and act accordingly with less or no human intervention. These talking machines make things easy but if they are not guarded well, they can create chaos. Also, IoT involves private confidential data, financial records, human lives, and ecosystems. Attackers can exploit the loopholes in the IoT security and can harm the humans or the system either directly or indirectly. Hence, security of IoT has to be ensured. To give an estimate of the efficiency of the present day security algorithms, a security engineering framework [40] is applied to a system based on IoT. This work aims at identifying all the possible ways a system can be attacked and try to suggest optimal security algorithms which can mitigate the identified security issues. After all, "a secure IoT guarantees a safe world."
URI: http://dspace.dtu.ac.in:8080/jspui/handle/repository/15831
Appears in Collections:M.E./M.Tech. Computer Engineering

Files in This Item:
File Description SizeFormat 
thesis_2k15-swe-01.pdf1.4 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.