Please use this identifier to cite or link to this item: http://dspace.dtu.ac.in:8080/jspui/handle/repository/21837
Title: AUTHENTICATION OF IOT DEVICES USING PUF AND ENCRYPTION TECHNIQUE
Authors: SHARMA, MOHIT
Keywords: IOT DEVICES
PHYSICALLY UNCLONABLE FUNCTION
ENCRYPTION TECHNIQUE
Issue Date: May-2025
Series/Report no.: TD-8059;
Abstract: The rapid proliferation of the Internet of Things (IoT) has introduced unprecedented opportunities for automation, intelligence, and connectivity across various domains, in cluding healthcare, smart cities, industrial systems, and personal environments. However, the security and privacy challenges associated with such interconnected systems remain critical concerns, especially given the constrained computational resources and heteroge neous nature of IoT devices. This review synthesizes and critically analyzes ten seminal research contributions addressing various dimensions of IoT security. The focus areas include lightweight cryptographic algorithms, preference-based privacy protection, secure authentication and access control mechanisms, identity management frameworks, and the integration of emerging technologies such as Physical Unclonable Functions (PUFs) and Software Defined Networking (SDN). Additionally, the survey covers architectural perspectives, enabling technologies, and implementation challenges pertaining to IoT se curity models.Each paper is dissected in terms of its methodology, technical innovation, and effectiveness in mitigating specific threats such as identity theft, unauthorized ac cess, data leakage, and network-level intrusions. The review also provides a comparative evaluation of these approaches, highlighting their strengths, limitations, and applicability to different IoT environments. A dedicated chapter presents essential background con cepts to aid reader comprehension, followed by an in-depth discussion on methodological frameworks employed across the literature. Where applicable, implementation insights and experimental outcomes are explored to bridge theory with practice. The final sec tions distill key findings, identify gaps, and suggest future research directions aimed at enhancing the resilience and scalability of IoT systems. This review is an in-depth re source for practitioners and scholars who wish to comprehend and develop the role of security in the future IoT scenario.
URI: http://dspace.dtu.ac.in:8080/jspui/handle/repository/21837
Appears in Collections:M.E./M.Tech. Computer Engineering

Files in This Item:
File Description SizeFormat 
Mohit Sharma M.Tech.pdf5.85 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.