Security Protocol to Prevent Attacks from Programmable Matter in IoT Networks

Security Protocol to Prevent Attacks from Programmable Matter in IoT Networks Abstract: The IoT is the blooming technology across the world. The IoT technology can take the advantages of every object and creating applications with new abilities. The development of IoT technology will be introducing...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: SARITHA, G, M., ANAND, PARTHASARATHY, S, B. V., BAIJU, DWARAKANATH, B, SRINATH, MANJUNATHA SWAMY, S., GOWRISHANKAR, VIMALA JULIET, A, RAMPRABU, G, A. K., GNANASEKAR
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Security Protocol to Prevent Attacks from Programmable Matter in IoT Networks Abstract: The IoT is the blooming technology across the world. The IoT technology can take the advantages of every object and creating applications with new abilities. The development of IoT technology will be introducing humans to a new world where the quality of the life will be improved. The IoT devices get integrated with a new device by using the mechanism of authentication. Thus, the system connected using IoT can provide the new device with an automatic identification mechanism. Autonomous operation, tracking, control, integration, indexing, and connectivity are the features of IoT technology. The IoT technology can transform the traditional control mechanism to intelligent control based on the need for the application. This invention is involved in the development of the management system that maintains security using the IoT networks to minimize the power consumption and the time required. The proposed security management system is a model that is suitable for the selection of the security mechanisms and protocols for every layer. The proposed security management system provides the security requirements such as routing and access control, privacy and authentication, integrity in each layer of security. Thus, the proposed system model is capable of protecting the private data, detecting the attacks and threats, and detecting any data transmission error. Sectriy Layer orat IOT asec Protocols and Mechanism Database Se Protocol, IEEE 802. 11 AH Serurty imchanismis or W'N Perception Layer - Symmretnc key Algorithms RFID and All M * MenismEhan for DatRF D Types of Sensors IPSec. Security Mechanisms for All Types of sensors: Riskl Network Layer - for Data: Cryptography Systems. Trarnission Mledium _Mecha~nisms for Transmission _ Dat and Transmissin Mechanisms End to End Aujth. Database Protocols Mechanisms for Transmission Server - Protocol: Cross Network Auth Protorcot- SMOTT Mechanisms Applicatior Layer - _for Appfication layers;-_ Irdefligent Community MGT Server over SSL, Biomnetric First Phase Second Phase Thrd Phase Users Users Figure 3: The proposed security management for IoT network.