Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/5459
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSharma, Priyanshi-
dc.contributor.authorShukla, Shailendra [Guided by]-
dc.date.accessioned2022-08-02T03:50:48Z-
dc.date.available2022-08-02T03:50:48Z-
dc.date.issued2017-
dc.identifier.urihttp://ir.juit.ac.in:8080/jspui//xmlui/handle/123456789/5459-
dc.description.abstractIn the current era of digital world as well as globalization, the interconnectivity is growing at very swift rate. Now days, we are surrounded with number of gadgets, mobile devices, smartphones, wireless nodes and many other objects which are digitally connected in real time. Internet of Things (IoT) is one of the prominent domains in wireless networking which enable the link between the real world objects. With the implementation of IoT, the physical objects in real world can be connected with each other to share the information and communicate in real time with higher degree of performance as well as security. IoT works on the development and integration of smart objects which can be controlled using remote network infrastructure. In this research work with the proposed security in the IoT networks, the scenario of dynamic key exchange between the motes shall be done in which the dynamic security key will be generated and authenticated for communication. In IoT security, it is necessary to devise and implement the protocols and algorithms by which the overall privacy and security in communication can be enforced to avoid any intrusion. As IoT can be used for military applications, it becomes mandatory to work on highly secured algorithms of key exchange with dynamic cryptography of security keys. The existing algorithm is devised with the integration of dynamic hybrid keys for secured communication to give the improved results on multiple parameters. In this simulation of IoT network, the scenario of dynamic key exchange between the motes is done in which the dynamic security key is being generated and authenticated for communication. In IoT security, it is necessary to devise and implement the protocols and algorithms by which the overall privacy and security in communication can be enforced to avoid any intrusion. As IoT can be used for military applications, it becomes mandatory to work on highly secured algorithms of key exchange with dynamic cryptography of security keys. The implementation is done using Cooja IoT Simulator to depict the scenarios. The implementation for IoT security is done on Cooja simulator so that the dynamic key exchange and security aspects can be presented.en_US
dc.language.isoenen_US
dc.publisherJaypee University of Information Technology, Solan, H.P.en_US
dc.subjectContikien_US
dc.subjectCooja simulatoren_US
dc.subjectInternet of thingsen_US
dc.subjectIoT securityen_US
dc.titleAnalysis and Implementation for Secured Version Number and Rank Authentication (VeRA) in RPL (IoT)en_US
dc.typeProject Reporten_US
Appears in Collections:Dissertations (M.Tech.)



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.