Please use this identifier to cite or link to this item:
Title: Study of Security Protocols in Internet of Things
Authors: Amanov, Samir
Keywords: Internet of Things
Issue Date: 2017
Abstract: The Internet of Things is inter-connection of humans, physical devices, buildings, vehicles and many items around us which collects data and exchange it with the help of electronics, software, sensors, and actuators over the network. Main purpose of IoT is to allow all of these objects to be sensed and controlled remotely. IoT aspires to make connection between anyone and anything, anytime and anywhere over the world. Analysts and experts considering that IoT will consist of more than 50 billion devices connected over the network by 2020. IoT devices could be called smart devices. Also from the definition of smart devices we can prove it, a smart device is an electronic device, generally connected to other devices or networks via different wireless protocols. As it is discussed above, IoT devices are connected over network and exchanging with data. Data security is one of the main goals in today world and network security is one of the important concepts in data security as the data transfered over the network should be made secure to prevent data loss and to prevent from someone who wants to read or change the data. IoT security involves securing the data and uploading the data to the cloud .There are typical security goals, Confidentiality, Integrity, Availability, Authentication, which are also applied to IoT. Security protocols apply cryptographic methods to ensure protection of data. Generally used with communication protocols to provide secure delivery of data between two parties. To send data to the cloud first it must be encrypted. In this topic we will discuss how to apply Advanced Encryption Standard (AES) algorithm and RSA algorithm in Internet of Things to encrypt data which will be sent over the unsecure network.
Appears in Collections:Theses

Files in This Item:
File Description SizeFormat 
SamirAmanov_Master_Thesis.pdf1.25 MBAdobe PDFView/Open

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.