Please use this identifier to cite or link to this item:
|Title:||Study of Security Protocols in Internet of Things|
|Keywords:||Internet of Things|
|Abstract:||The Internet of Things is inter-connection of humans, physical devices, buildings, vehicles and many items around us which collects data and exchange it with the help of electronics, software, sensors, and actuators over the network. Main purpose of IoT is to allow all of these objects to be sensed and controlled remotely. IoT aspires to make connection between anyone and anything, anytime and anywhere over the world. Analysts and experts considering that IoT will consist of more than 50 billion devices connected over the network by 2020. IoT devices could be called smart devices. Also from the definition of smart devices we can prove it, a smart device is an electronic device, generally connected to other devices or networks via different wireless protocols. As it is discussed above, IoT devices are connected over network and exchanging with data. Data security is one of the main goals in today world and network security is one of the important concepts in data security as the data transfered over the network should be made secure to prevent data loss and to prevent from someone who wants to read or change the data. IoT security involves securing the data and uploading the data to the cloud .There are typical security goals, Confidentiality, Integrity, Availability, Authentication, which are also applied to IoT. Security protocols apply cryptographic methods to ensure protection of data. Generally used with communication protocols to provide secure delivery of data between two parties. To send data to the cloud first it must be encrypted. In this topic we will discuss how to apply Advanced Encryption Standard (AES) algorithm and RSA algorithm in Internet of Things to encrypt data which will be sent over the unsecure network.|
|Appears in Collections:||Theses|
Files in This Item:
|SamirAmanov_Master_Thesis.pdf||1.25 MB||Adobe PDF||View/Open|
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.