Please use this identifier to cite or link to this item: http://dspace.dtu.ac.in:8080/jspui/handle/repository/20632
Title: DESIGN OF LIGHTWEIGHT SCHEMES TO ENSURE SECURITY OF THE INTERNET OF THINGS
Authors: ALAM, IRFAN
Keywords: LIGHTWEIGHT SCHEMES
INTERNET OF THINGS (IoT)
STRONG AUTHENTICATION
Issue Date: Feb-2024
Series/Report no.: TD-7034;
Abstract: The Internet of Things (IoT) is one of the core and essence of the infrastructure of the modern world. Almost all facets of human endeavor now have applications for the IoT, making it one of the most revolutionary technological advancements. IoT provides seamless communication and data exchange by linking common objects and gadgets to the internet, resulting in unmatched efficiency, convenience, and innovation. IoT promotes a more connected, intelligent, and sustainable society through smart homes that allow automated management over appliances and energy use and intelligent healthcare systems that monitor patients remotely. IoT also facilitates predictive maintenance in industrial environments and increases efficiency by optimizing processes. Accepting the immense potential of IoT not only improves decision-making and streamlines operations, but it also paves the way for a time when technology enables us to live safer, healthier, and more connected lives. IoT devices constantly generate, analyze, and exchange substantial volumes of security-critical and privacy-sensitive data, making them ideal targets for attacks and vulnerabilities. IoT security focuses on defending networks, devices, and data against potential threats and security flaws. A breach might have serious repercussions because there are numerous linked devices gathering and transmitting sensitive information. To strengthen IoT security, strong authentication, encryption, and regular software updates are essential. It is crucial to prioritize and invest in comprehensive security measures as the IoT ecosystem continues to grow. In the case of the IoT, security measures vary from application to application. Authentication is mandatory for almost all applications related to the IoT infrastructure. It is a fundamental security measure that must be used by all IoT-based services to keep out intruders and illegal access. IoT authentication is important for ensuring that only authorized people and devices have access to networked systems. Strong authentication procedures, such as strong cryptographic algorithms and distinctive IDs, build confidence and stop unauthorized parties from altering or tampering with sensitive data. IoT networks can guard against potential intrusions, protect user privacy, and uphold the general integrity of the interconnected ecosystem by putting strong authentication methods in place. Therefore, we emphasized significant assaults and technical approaches against the IoT authentication system. One of the primary challenges is choosing the optimised security protocol because of limitations such as dynamic resources and limited storage. Before being used in real-world applications, authentication systems must endure thorough crypt-analysis.We also covered current security verification methods and IoT authentication evaluation strategies. We have tried to prove that our proposed schemes are resilient to various numbers of attacks in V formal analysis sections of each chapter. First, this thesis encompasses all the necessary stuff for understanding all about IoT systems, such as definition, basic architecture and its application, IoT security, the critical status of IoT security, and the importance of authentication in the introduction chapter. A literature review has been performed in an organized way on the basis of recent manuscripts from top-rated journals. Second, this thesis proposes a novel scheme for efficient authentication in cloud based IoT devices. Third, this thesis proposes a novel authentication scheme for group-based authentication. Fourth, this thesis proposes a novel authentication protocol to ensure confidentiality among the Internet of Medical Things (IoMT). Fifth, this thesis discusses the performance evaluation of the discussed protocols and schemes in a resource-constrained IoT network. Finally, our work presents security concerns, unresolved issues, and prospective future IoT authentication applications in order to assist future researchers, along with a conclusion.
URI: http://dspace.dtu.ac.in:8080/jspui/handle/repository/20632
Appears in Collections:Ph.D. Computer Engineering

Files in This Item:
File Description SizeFormat 
IRFAN ALAM Ph.D..pdf4.21 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.