Please use this identifier to cite or link to this item: http://dspace.dtu.ac.in:8080/jspui/handle/repository/21837
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSHARMA, MOHIT-
dc.date.accessioned2025-07-08T08:47:39Z-
dc.date.available2025-07-08T08:47:39Z-
dc.date.issued2025-05-
dc.identifier.urihttp://dspace.dtu.ac.in:8080/jspui/handle/repository/21837-
dc.description.abstractThe rapid proliferation of the Internet of Things (IoT) has introduced unprecedented opportunities for automation, intelligence, and connectivity across various domains, in cluding healthcare, smart cities, industrial systems, and personal environments. However, the security and privacy challenges associated with such interconnected systems remain critical concerns, especially given the constrained computational resources and heteroge neous nature of IoT devices. This review synthesizes and critically analyzes ten seminal research contributions addressing various dimensions of IoT security. The focus areas include lightweight cryptographic algorithms, preference-based privacy protection, secure authentication and access control mechanisms, identity management frameworks, and the integration of emerging technologies such as Physical Unclonable Functions (PUFs) and Software Defined Networking (SDN). Additionally, the survey covers architectural perspectives, enabling technologies, and implementation challenges pertaining to IoT se curity models.Each paper is dissected in terms of its methodology, technical innovation, and effectiveness in mitigating specific threats such as identity theft, unauthorized ac cess, data leakage, and network-level intrusions. The review also provides a comparative evaluation of these approaches, highlighting their strengths, limitations, and applicability to different IoT environments. A dedicated chapter presents essential background con cepts to aid reader comprehension, followed by an in-depth discussion on methodological frameworks employed across the literature. Where applicable, implementation insights and experimental outcomes are explored to bridge theory with practice. The final sec tions distill key findings, identify gaps, and suggest future research directions aimed at enhancing the resilience and scalability of IoT systems. This review is an in-depth re source for practitioners and scholars who wish to comprehend and develop the role of security in the future IoT scenario.en_US
dc.language.isoenen_US
dc.relation.ispartofseriesTD-8059;-
dc.subjectIOT DEVICESen_US
dc.subjectPHYSICALLY UNCLONABLE FUNCTIONen_US
dc.subjectENCRYPTION TECHNIQUEen_US
dc.titleAUTHENTICATION OF IOT DEVICES USING PUF AND ENCRYPTION TECHNIQUEen_US
dc.typeThesisen_US
Appears in Collections:M.E./M.Tech. Computer Engineering

Files in This Item:
File Description SizeFormat 
Mohit Sharma M.Tech.pdf5.85 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.