Please use this identifier to cite or link to this item:
http://dspace.dtu.ac.in:8080/jspui/handle/repository/21837
Title: | AUTHENTICATION OF IOT DEVICES USING PUF AND ENCRYPTION TECHNIQUE |
Authors: | SHARMA, MOHIT |
Keywords: | IOT DEVICES PHYSICALLY UNCLONABLE FUNCTION ENCRYPTION TECHNIQUE |
Issue Date: | May-2025 |
Series/Report no.: | TD-8059; |
Abstract: | The rapid proliferation of the Internet of Things (IoT) has introduced unprecedented opportunities for automation, intelligence, and connectivity across various domains, in cluding healthcare, smart cities, industrial systems, and personal environments. However, the security and privacy challenges associated with such interconnected systems remain critical concerns, especially given the constrained computational resources and heteroge neous nature of IoT devices. This review synthesizes and critically analyzes ten seminal research contributions addressing various dimensions of IoT security. The focus areas include lightweight cryptographic algorithms, preference-based privacy protection, secure authentication and access control mechanisms, identity management frameworks, and the integration of emerging technologies such as Physical Unclonable Functions (PUFs) and Software Defined Networking (SDN). Additionally, the survey covers architectural perspectives, enabling technologies, and implementation challenges pertaining to IoT se curity models.Each paper is dissected in terms of its methodology, technical innovation, and effectiveness in mitigating specific threats such as identity theft, unauthorized ac cess, data leakage, and network-level intrusions. The review also provides a comparative evaluation of these approaches, highlighting their strengths, limitations, and applicability to different IoT environments. A dedicated chapter presents essential background con cepts to aid reader comprehension, followed by an in-depth discussion on methodological frameworks employed across the literature. Where applicable, implementation insights and experimental outcomes are explored to bridge theory with practice. The final sec tions distill key findings, identify gaps, and suggest future research directions aimed at enhancing the resilience and scalability of IoT systems. This review is an in-depth re source for practitioners and scholars who wish to comprehend and develop the role of security in the future IoT scenario. |
URI: | http://dspace.dtu.ac.in:8080/jspui/handle/repository/21837 |
Appears in Collections: | M.E./M.Tech. Computer Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Mohit Sharma M.Tech.pdf | 5.85 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.