Please use this identifier to cite or link to this item:
http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7274
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sharma, Ashish | - |
dc.contributor.author | Gupta, Prakhar | - |
dc.contributor.author | Kumar, Arvind [Guided by] | - |
dc.date.accessioned | 2022-10-04T11:35:12Z | - |
dc.date.available | 2022-10-04T11:35:12Z | - |
dc.date.issued | 2016 | - |
dc.identifier.uri | http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7274 | - |
dc.description.abstract | Internet of Things (IoT) has been a very trending research topic in the recent times, where physical objects interconnect as a result of conjunction of various existing technologies. IoT is rapidly developing, but there have been uncertainties about its security and privacy which can affect its sustainability. The network layer which is both wired or wireless is exposed to many kinds of attacks. Because of the openness of these wireless channels, communications can be easily monitored. This Project involves designing and implementing the security algorithms which can be of three types: Routing Security, Data Privacy and Authentication. Authentication is the process of identifying users, computers, devices and machines in networks and restricting access to authorized people and non-manipulated devices. Processes of authentication typically rely on usernames and passwords, which are not particularly secure, but require frequent changing and do not work with unattended devices. Cryptographic mechanisms are a more stable way of securing communication over the Internet of Things. Particularly in embedded systems, where security demands are rising to protect against counterfeiting, firmware tampering and illegal access, strong cryptography is the only way to fulfill today’s needs. Routing Security is based on prevention against hackers who can easily access smart products wirelessly which can be devastating for some persons. Data Privacy: - Data by one click can be deleted leading to breakdown of firm’s most secured information about finance and other dealings. Hence keeping the data secure has to be the major functionality of smart products. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Jaypee University of Information Technology, Solan, H.P. | en_US |
dc.subject | Black hole | en_US |
dc.subject | lossy network | en_US |
dc.title | Detection of a Black Hole Attack in RPL using IDS | en_US |
dc.type | Project Report | en_US |
Appears in Collections: | B.Tech. Project Reports |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Detection of a Black Hole Attack in RPL using IDS.pdf | 1.32 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.