Aman
Aman
Aman
Department
of
Electronics and Communication
Research Topic
Student Name :
Research Guide :
Aman Kumar Roy
Prof. Rajesh Saha
2020UEC1629
Contents :-
Intoduction
Security Challenges
Security Mechanism
Security of IoT
Conclusion
Introduction -
Rapid growing network .
Many of these services require users to intentionally reveal personal data for
advanced and more personalized services.
# Security Requirements
There are three levels where security is required:-
1.Information Level
2. Access Level
3.Functional Level
Information Level
At this level, security should guarentee the following requirements:
2) Anonymity: The identity of the data source should remain hidden from third parties.
4) Privacy: The user’s private information should not be disclosed during the data exchange.
Access Level
It specifies some security mechanisms to control the access of the network:
2) Authentication: Does device has the right to access a network and vice
- versa
This level defines the security requirements in terms of the following criteria.
1) Resilience: Network's capacity to ensure security, even in case of attacks and failures.
attacks.
Security Mechanism
Standard security mechanisms designed to overcome the above problems are:
Encryption
Light Weight Cryptography
Random Number Generators
Secure Hardware
Intrusion detection System
Ecnryption
Confidentiality during communication.
Convert actual message to different one.
Reverted only with a secret key.
Substitution(S) Cipher
Transportation(T) Cipher
Linear(L) Cipher
Depending on the length of the key, the number of blocks as well as the name is determined.
Lightweight Cryptography
Low-complexity IoT devices.
Resource and energy-constrained devices.
Required to design specific security algorithms.
Standard lightweight cryptography mechanism - PRESENT and CLEIFA.
Random Number Generator
Randomness - the base of encryption.
Cryptographically secure when probability lesser than 1/2.
www.google.com
www.canva.com
ieeexplore.ieee.org
en.wikipedia.org/wiki/Internet_of_things