Description
The world of IoT existence is wholly being built on the communication and the interconnection
of things. Thing are nothing but edge devices which form the core element of IoT. From device
that have sensors in the farm that accept data as input to mobile in our pockets or to pacemakers
in the human heart are all innovative IoT devices that have today integrated in our lives. The idea
of designing an edge device would moves form a mechanical electrical machine or device to an
automatized electronic device. The electronic device soon transcended to use digital signal for its
working and were programmed to become smart devices. The electronic embedded device was
attached to the Internet thus developing the IoT network. IoT network has a continuum to data
transiting for one device to the next. Initially most of this data is open, unprotected and in the
clear text form since these devices are low level computing device with less power and memory.
The 6LoWPAN, NFC, RFID, Bluetooth, Wi-Fi or Zigbee were the types of the communication
used by them. It has been seen that in spite of various message protocols the basic commination
between the edge device has been the TCP and the UDP Communication protocol. The data was
always venerable to attack by malicious users. One of the solutions to provide protection to the
data was encryption of the plain text by encryption techniques before the data could be send for
one device to another. The research work is aimed to find out different was to improve and
implement security on the edge devices. This is done by creating a proposed prototype which
consist of raspberry pi that implemented smart homes. Experiments were carried out to check
communication between them, encrypting the data on transit, using symmetric and will a
lightweight cryptographic algorithm. The experiments use PRESENT and AES algorithms to
prove it. The system was breached to test the Ping of death and Smurf attack as DOS attack. The
Sniffing for the password was done by Wireshark that also helped in the monitoring of the
network. Thus, proving that encryption was a good solution for implementing security but the
network was venerable to DOS and DDOS attack. In the objective to improving the security and
privacy of edge device the research work opened avenue of using block chain a concept of
implementing security by constructing two contract that were linked with each other. One was a
device contract that would automatically get an agreement contract by a miner what could be
another device attached to it. It would act an authenticator and generate a key for the device. If
the device would want to communicate it would with the key. The transactions of the device and
well as the agreement were stored in the local store. The concept help to encrypt the data within
the transaction while the sender and the receiver addresses are hashed which is the security
benefits of the block chain.
Author: Maria Leopoldina
Publisher: Ary Publisher
Published: 12/21/2022
Pages: 272
Binding Type: Paperback
Weight: 0.81lbs
Size: 9.00h x 6.00w x 0.57d
ISBN13: 9785316593507
ISBN10: 5316593502
BISAC Categories:
- Computers | Security | General