Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/5459
Title: Analysis and Implementation for Secured Version Number and Rank Authentication (VeRA) in RPL (IoT)
Authors: Sharma, Priyanshi
Shukla, Shailendra [Guided by]
Keywords: Contiki
Cooja simulator
Internet of things
IoT security
Issue Date: 2017
Publisher: Jaypee University of Information Technology, Solan, H.P.
Abstract: In the current era of digital world as well as globalization, the interconnectivity is growing at very swift rate. Now days, we are surrounded with number of gadgets, mobile devices, smartphones, wireless nodes and many other objects which are digitally connected in real time. Internet of Things (IoT) is one of the prominent domains in wireless networking which enable the link between the real world objects. With the implementation of IoT, the physical objects in real world can be connected with each other to share the information and communicate in real time with higher degree of performance as well as security. IoT works on the development and integration of smart objects which can be controlled using remote network infrastructure. In this research work with the proposed security in the IoT networks, the scenario of dynamic key exchange between the motes shall be done in which the dynamic security key will be generated and authenticated for communication. In IoT security, it is necessary to devise and implement the protocols and algorithms by which the overall privacy and security in communication can be enforced to avoid any intrusion. As IoT can be used for military applications, it becomes mandatory to work on highly secured algorithms of key exchange with dynamic cryptography of security keys. The existing algorithm is devised with the integration of dynamic hybrid keys for secured communication to give the improved results on multiple parameters. In this simulation of IoT network, the scenario of dynamic key exchange between the motes is done in which the dynamic security key is being generated and authenticated for communication. In IoT security, it is necessary to devise and implement the protocols and algorithms by which the overall privacy and security in communication can be enforced to avoid any intrusion. As IoT can be used for military applications, it becomes mandatory to work on highly secured algorithms of key exchange with dynamic cryptography of security keys. The implementation is done using Cooja IoT Simulator to depict the scenarios. The implementation for IoT security is done on Cooja simulator so that the dynamic key exchange and security aspects can be presented.
URI: http://ir.juit.ac.in:8080/jspui//xmlui/handle/123456789/5459
Appears in Collections:Dissertations (M.Tech.)



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.