Journal Press India®

Proposed Model in IoT Security Layer for Ethical Security Management

Vol 5 , Issue 2 , July - December 2022 | Pages: 54-64 | Research Paper  

https://doi.org/10.51976/jfsa.522208


Author Details ( * ) denotes Corresponding author

1. * Neeraj Kumar Pandey, Assistant Professor, School of Computing, DIT University, Dehradun, Uttarakhand, India (dr.neerajkpandey@gmail.com)

With the number of similar applications and concepts being used these days the threats of cyber-attacks are also high, where completely different attacks and threats can result in serious problems to the whole system of the network, hence making the concepts of security system to be extremely important. The present analysis helps in discussing the management of security in IoT networks discussing it in five sections. We tend to 1st illustrate the background and conception behind the idea of IoT. After which the needs for safety for IoT are mentioned. In the next section, the projected design may be wont to return up with safety management has been elaborated. Then we tend to implement web protocol security because of the Network Cryptography system security. An example of however handily this projected design may be wont to return with proper management of safety for the IoT network was also explained intimately.

Keywords

IoT; Security and management; Threats and attacks; Design and layers; Network security; Science security; Cryptography


  1. Ovidiu Vermesan, Peter Friess, net Of Things: connection Technologies for Smart environments And Integrated system. Aalborg, Denmark: watercourse Publishers, 2013.

  2. Ovidiu Vermesan, Peter Friess, net Of Things from Analysis and Innovation to Market Deployment. Aalborg, Denmark: watercourse Publishers, 2014.

  3. Klaus Finkenzeller, Rfid enchiridion elementary And Applications in Contactless Smartcards, frequency Identification, And Near field Communication. Wiltshire, UK: John Wiley & Sons, 3RD Ed., 2010.

  4. Mounib Khanafer, Mouhcine Guennoun, Hussein T. Mouftah, “A Survey of bea- con-enabled Ieee 802.15.4 Mack Protocol in Wireless detector Networks,” Ieee Communication Survey& Tutorials, Vol. 16, Pp. 856-876, Dec 2013.

  5. Saniya Vohra, Rohit Srivastava, “A Survey on Techniques for Securing 6LOWPAN,” Fifth International Conference on Communication Systems and Net- work Technologies, Pp. 643-646, April 2015.

  6. Vasileios Karagiannis, Periklis Chatzimisios, Francisco Vazquez-Gallego, Christ Alonso-Zarate, “A Survey on Application Layer Protocols For the web Of Things,” group action On IoT and Cloud Computing, Pp. 1-8, April 2015.

  7. Davide Conzon, Thomas Bolognesi, Paolo Brizzi, Antonio Lotito, Riccardo To- masi, Maurizio A. Spirito, “An Xmpp primarily based design For Secure IoT Com- munications,” Interational Conference On pc Commination’s and Networks, Pp. 1- 6, August 2012.

  8. H. Alshamrani, “Internet Protocol Security (IPsec) Mechanisms,” International Journal of Scientific & Engineering analysis, Vol. 5, No. 5, pp. 85-87, 2014.

  9. P. K. Singh and P. P. Singh, “A Novel Approach for the Analysis & problems with IPsec Vpn,” International Journal of Science and analysis, Vol. 2, No. 7, pp. 187- 189, 2013.

  10. A. Singh and M. Gahlawat, “Internet Protocol Security (IPsec),” International Jour- nal of pc Networks and Wireless Communications, Vol. 2, No. 6, pp. 717-721, 2012.

  11. HareKrishna Kumar and V.K. Tomar. “Stability analysis of sub-threshold 6T SRAM cell at 45 nm for IoT application” International Journal of Recent Technol- ogy and Engineering (IJRTE), 8(2):2432-2438, July 2019.

  12. T. Sharma and S. Shiwani, “Statistical Results of IPsec in Ipv6 Networks,” Inter- national Journal of pc Applications, Vol. 79, No. 2, pp. 15-19, 2013.

  13. Nira, Shukla A. (2021) Optimal Multiple Access Scheme for 5G and Beyond Com- munication Network. In: Senjyu T., Mahalle P.N., Perumal T., Joshi A. (eds) In- formation and Communication Technology for Intelligent Systems. ICTIS 2020. Smart Innovation, Systems and Technologies, vol 195. Springer, Singapore. https://doi.org/10.1007/978-981-15-7078-0_5

  14. R. Rahim and A. Ikhwan, “Study of 3 Pass Protocol on Information Security,” In- ternational Journal of Science and analysis, Vol. 5, No. 11, pp. 102104, 2016.

  15. A. Lubis And A. P. U. S., “Network forensic Application normally Cases,” Iosr Journal Of pc Engineering, Vol. 18, No. 6, pp. 41-44, 2016

  16. Punit Gupta, Jasmeet Chhabra, “ It primarily based good Home-style exploitation Power and Security management,” International Conference on Innovation and Challenging in Cyber Security, Pp. 6-10, August 2016.

Abstract Views: 1
PDF Views: 286

Advanced Search

News/Events

Indira Institute of ...

Indira Institute of Management, Pune Organizing International Confe...

D. Y. Patil Internat...

D. Y. Patil International University, Akurdi-Pune Organizing Nation...

ISBM College of Engi...

ISBM College of Engineering, Pune Organizing International Conferen...

Periyar Maniammai In...

Department of Commerce Periyar Maniammai Institute of Science &...

Institute of Managem...

Vivekanand Education Society's Institute of Management Studies ...

Institute of Managem...

Deccan Education Society Institute of Management Development and Re...

S.B. Patil Institute...

Pimpri Chinchwad Education Trust's S.B. Patil Institute of Mana...

D. Y. Patil IMCAM, A...

D. Y. Patil Institute of Master of Computer Applications & Managem...

Vignana Jyothi Insti...

Vignana Jyothi Institute of Management International Conference on ...

Department of Commer...

Department of Commerce, Faculty of Commerce & Business, University...

By continuing to use this website, you consent to the use of cookies in accordance with our Cookie Policy.