Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7274
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSharma, Ashish-
dc.contributor.authorGupta, Prakhar-
dc.contributor.authorKumar, Arvind [Guided by]-
dc.date.accessioned2022-10-04T11:35:12Z-
dc.date.available2022-10-04T11:35:12Z-
dc.date.issued2016-
dc.identifier.urihttp://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7274-
dc.description.abstractInternet of Things (IoT) has been a very trending research topic in the recent times, where physical objects interconnect as a result of conjunction of various existing technologies. IoT is rapidly developing, but there have been uncertainties about its security and privacy which can affect its sustainability. The network layer which is both wired or wireless is exposed to many kinds of attacks. Because of the openness of these wireless channels, communications can be easily monitored. This Project involves designing and implementing the security algorithms which can be of three types: Routing Security, Data Privacy and Authentication. Authentication is the process of identifying users, computers, devices and machines in networks and restricting access to authorized people and non-manipulated devices. Processes of authentication typically rely on usernames and passwords, which are not particularly secure, but require frequent changing and do not work with unattended devices. Cryptographic mechanisms are a more stable way of securing communication over the Internet of Things. Particularly in embedded systems, where security demands are rising to protect against counterfeiting, firmware tampering and illegal access, strong cryptography is the only way to fulfill today’s needs. Routing Security is based on prevention against hackers who can easily access smart products wirelessly which can be devastating for some persons. Data Privacy: - Data by one click can be deleted leading to breakdown of firm’s most secured information about finance and other dealings. Hence keeping the data secure has to be the major functionality of smart products.en_US
dc.language.isoenen_US
dc.publisherJaypee University of Information Technology, Solan, H.P.en_US
dc.subjectBlack holeen_US
dc.subjectlossy networken_US
dc.titleDetection of a Black Hole Attack in RPL using IDSen_US
dc.typeProject Reporten_US
Appears in Collections:B.Tech. Project Reports

Files in This Item:
File Description SizeFormat 
Detection of a Black Hole Attack in RPL using IDS.pdf1.32 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.