The Internet of Thin Films: Research Limitation, Future Scope and Conclusion
VerifiedAdded on  2023/04/24
|42
|10071
|480
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Project Dissertation
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Contents
Chapter 1: Introduction:.............................................................................................................2
Research purpose:...................................................................................................................2
Research Aim:........................................................................................................................3
Research Objectives:..............................................................................................................3
Research Questions:...............................................................................................................3
Research Strategy:..................................................................................................................3
Significance of Study:............................................................................................................3
Thesis Structure......................................................................................................................4
Chapter 2: Literature Review.....................................................................................................5
Chapter 3: Research Methodology...........................................................................................13
Chapter 4: Research Analysis and approach............................................................................17
Chapter 5: Proposed Solution...................................................................................................23
Chapter 6: Result and Findings................................................................................................31
Chapter 7: Research Limitation, Future Scope and Conclusion..............................................36
References:...............................................................................................................................38
Chapter 1: Introduction:.............................................................................................................2
Research purpose:...................................................................................................................2
Research Aim:........................................................................................................................3
Research Objectives:..............................................................................................................3
Research Questions:...............................................................................................................3
Research Strategy:..................................................................................................................3
Significance of Study:............................................................................................................3
Thesis Structure......................................................................................................................4
Chapter 2: Literature Review.....................................................................................................5
Chapter 3: Research Methodology...........................................................................................13
Chapter 4: Research Analysis and approach............................................................................17
Chapter 5: Proposed Solution...................................................................................................23
Chapter 6: Result and Findings................................................................................................31
Chapter 7: Research Limitation, Future Scope and Conclusion..............................................36
References:...............................................................................................................................38
Chapter 1: Introduction:
The internet of things is the most promising and emerging technology which requires high
parameters of security to get accuracy in completing the flow of work done. The IOT
framework is plug-in with the various security challenges such as security associated with the
constrained devices, authorization and authentication of the system, managing updating
features to the devices, ensuring privacy and data integration, mobility of the cloud
applications, ensuring high availability of data and information, detecting cyber securities
attack, identifying and managing vulnerabilities, and prediction of the security issues (Gondi,
and et.al., 2016). The focus should be given on identifying the attacks associated with the
transport layer and socket layer so that the vulnerabilities can be handled at an early stage and
the proactive action plan can be prepared against the vulnerabilities. The transport layer
security requires the privacy between the two communicating devices and applications. The
security protocol should be developed for managing the transfer of files, virtual private
network connections, sending of instant messages to the communicating devices, and
managing the voice over Internet protocol. The handshaking protocol is used for
acknowledging the retrieval of secured information and data packets in the sequence sent by
the server (Hezam, Konstantas, Mahyoub, 2018). The message authentication codes are
added to the messages so that the sensitivity and confidentiality of the information can be
secured and failure of IOT communication can be minimized. Data integration helps in
providing security to the web applications by managing transfer of files by developing virtual
private network connections. The instant messaging system can be accelerated by developing
the two layer communication. TLS is made up of two protocols which are named as
Handshake protocol and record protocol (Siddiqui, and Badr, 2018). The authorization and
authentication is managed with the help of these protocols between the sender and receiver.
The TLS security architecture is composed of implementation obscure. The focus should be
given on developing the strong security protocol for the transport layer so that the accuracy in
the information flow can be managed for the effective working of the IOT infrastructure.
Research purpose:
The purpose of this paper is to develop a research program on identifying the problems and
issues which exist in the transport layer security and to propose a solution which is effective
for managing the TLS security in the IOT environment.
The internet of things is the most promising and emerging technology which requires high
parameters of security to get accuracy in completing the flow of work done. The IOT
framework is plug-in with the various security challenges such as security associated with the
constrained devices, authorization and authentication of the system, managing updating
features to the devices, ensuring privacy and data integration, mobility of the cloud
applications, ensuring high availability of data and information, detecting cyber securities
attack, identifying and managing vulnerabilities, and prediction of the security issues (Gondi,
and et.al., 2016). The focus should be given on identifying the attacks associated with the
transport layer and socket layer so that the vulnerabilities can be handled at an early stage and
the proactive action plan can be prepared against the vulnerabilities. The transport layer
security requires the privacy between the two communicating devices and applications. The
security protocol should be developed for managing the transfer of files, virtual private
network connections, sending of instant messages to the communicating devices, and
managing the voice over Internet protocol. The handshaking protocol is used for
acknowledging the retrieval of secured information and data packets in the sequence sent by
the server (Hezam, Konstantas, Mahyoub, 2018). The message authentication codes are
added to the messages so that the sensitivity and confidentiality of the information can be
secured and failure of IOT communication can be minimized. Data integration helps in
providing security to the web applications by managing transfer of files by developing virtual
private network connections. The instant messaging system can be accelerated by developing
the two layer communication. TLS is made up of two protocols which are named as
Handshake protocol and record protocol (Siddiqui, and Badr, 2018). The authorization and
authentication is managed with the help of these protocols between the sender and receiver.
The TLS security architecture is composed of implementation obscure. The focus should be
given on developing the strong security protocol for the transport layer so that the accuracy in
the information flow can be managed for the effective working of the IOT infrastructure.
Research purpose:
The purpose of this paper is to develop a research program on identifying the problems and
issues which exist in the transport layer security and to propose a solution which is effective
for managing the TLS security in the IOT environment.
Research Aim:
The aim of the research is to identify the different types of cyber-attacks which negatively
affect the transport layer security and functioning of the IOT architecture and propose a
solution which helps in securing and maintaining accuracy of the IOT working environment.
Research Objectives:
The objectives of the research are highlighted below:
 Identify the different types of cyber-attacks which negatively affect the transport layer
security
 Identify the impact of TLS attack on the IOT architecture
 Study of the literature for getting details of TLS attacks
 Proposing a solution which helps in securing and maintaining accuracy of the IOT
working environment
Research Questions:
What type of TLS attacks occur which negatively affect the IOT architecture? How the TLS
attacks can be minimized for developing highly secured architecture to preserve the accuracy
of the IOT environment?
Research Strategy:
The focus should be given on constructing the research questions for giving particular
direction to the research study. The study of literature is carried out to identify the problems
and research gaps so that effective solution can be proposed according to the requirement of
the TLS security in IOT environment. The solution should be proposed for managing the
security in the transport layer of the IOT infrastructure against the vulnerabilities. The
conclusion should be drawn from the research to identify the major challenges in the IOT
environment and efficacy of the proposed model.
Significance of Study:
The research study helps in evaluating the impact and the major challenges which the IOT
architecture has to be faced due to the cyber-attacks on the transport layer. The efficiency of
the Transport layer security can be measured with respect to the negative impact seen on the
IOT working environment (Mendez, and et.al., 2015). During the study, it has been identified
that the smart sensor environment is cope up with various challenges such as ineffective
security parameters associated with the smart devices, giving authority and authentication to
The aim of the research is to identify the different types of cyber-attacks which negatively
affect the transport layer security and functioning of the IOT architecture and propose a
solution which helps in securing and maintaining accuracy of the IOT working environment.
Research Objectives:
The objectives of the research are highlighted below:
 Identify the different types of cyber-attacks which negatively affect the transport layer
security
 Identify the impact of TLS attack on the IOT architecture
 Study of the literature for getting details of TLS attacks
 Proposing a solution which helps in securing and maintaining accuracy of the IOT
working environment
Research Questions:
What type of TLS attacks occur which negatively affect the IOT architecture? How the TLS
attacks can be minimized for developing highly secured architecture to preserve the accuracy
of the IOT environment?
Research Strategy:
The focus should be given on constructing the research questions for giving particular
direction to the research study. The study of literature is carried out to identify the problems
and research gaps so that effective solution can be proposed according to the requirement of
the TLS security in IOT environment. The solution should be proposed for managing the
security in the transport layer of the IOT infrastructure against the vulnerabilities. The
conclusion should be drawn from the research to identify the major challenges in the IOT
environment and efficacy of the proposed model.
Significance of Study:
The research study helps in evaluating the impact and the major challenges which the IOT
architecture has to be faced due to the cyber-attacks on the transport layer. The efficiency of
the Transport layer security can be measured with respect to the negative impact seen on the
IOT working environment (Mendez, and et.al., 2015). During the study, it has been identified
that the smart sensor environment is cope up with various challenges such as ineffective
security parameters associated with the smart devices, giving authority and authentication to
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
the network devices for message transfers, updating the devices according to the security
requirement, not secured communication and information flow between the sender and the
receiver, unavailability of the devices, ineffective detection of the vulnerabilities, no
proactive program for detecting the presence of intruder, and many more. The analysis of the
cyber-attacks and their impact of the IOT working program help in developing an effective
solution for securing the flow of information between the smart devices.
Thesis Structure
The first chapter focuses on the introduction to the transport layer security and IOT
infrastructure. The second chapter reviews the literature in the direction of transport layer
security with respect to the IOT infrastructure. The chapter 3 gives the details of research
methodology which should be undertaken to identify the cyber-attack on the TLS. The
discussion of the research analysis is carried out in the chapter 4. The proposed solution
should be provided to resolve the vulnerabilities associated with the TLS in chapter 6. The
result and future scope of the research program should be brief in chapter 7. The conclusion
of the research program is given in the last chapter 8 of the research study.
Chapter 2: Literature Review
The security is the major concern for managing communication between the sensor devices in
the IOT network because the whole system works on accuracy and flow of data packets
within the fraction of seconds. Industry 4.0 is the new revolution in the IOT framework
which is also called as fourth industrial revolution for building communication links in the
requirement, not secured communication and information flow between the sender and the
receiver, unavailability of the devices, ineffective detection of the vulnerabilities, no
proactive program for detecting the presence of intruder, and many more. The analysis of the
cyber-attacks and their impact of the IOT working program help in developing an effective
solution for securing the flow of information between the smart devices.
Thesis Structure
The first chapter focuses on the introduction to the transport layer security and IOT
infrastructure. The second chapter reviews the literature in the direction of transport layer
security with respect to the IOT infrastructure. The chapter 3 gives the details of research
methodology which should be undertaken to identify the cyber-attack on the TLS. The
discussion of the research analysis is carried out in the chapter 4. The proposed solution
should be provided to resolve the vulnerabilities associated with the TLS in chapter 6. The
result and future scope of the research program should be brief in chapter 7. The conclusion
of the research program is given in the last chapter 8 of the research study.
Chapter 2: Literature Review
The security is the major concern for managing communication between the sensor devices in
the IOT network because the whole system works on accuracy and flow of data packets
within the fraction of seconds. Industry 4.0 is the new revolution in the IOT framework
which is also called as fourth industrial revolution for building communication links in the
IOT infrastructure. Cyber physical system can be developed with the use of IOT for
controlling the intelligence and integrating it with the physical world (Corser, 2017). The
diagram below shows the connection between the physical and virtual world through the IOT
infrastructure:
The IOT services are used for developing the communication protocols to build interaction of
the machines with the human (Iqbal, Olaleye, and Bayoumi, 2016). The diagram below
shows the IOT service implementation in Industry 4.0
controlling the intelligence and integrating it with the physical world (Corser, 2017). The
diagram below shows the connection between the physical and virtual world through the IOT
infrastructure:
The IOT services are used for developing the communication protocols to build interaction of
the machines with the human (Iqbal, Olaleye, and Bayoumi, 2016). The diagram below
shows the IOT service implementation in Industry 4.0
In IOT infrastructure, the physical objects are known as smart objects because they are placed
with the sensor devices for having intelligence. It helps in managing the real time
communication and creating the virtual environment for the physical devices. The automation
and intelligence in the physical devices brings the industrial revolution which is called as
industry 4.0. The cyber-physical system (CPS) can be developed with the integration between
the smart devices which relatively helps in developing the smart factory. The presence of
vulnerabilities is the major concern for the CPS environment. The sensor devices are used for
developing connection between the physical world and virtual world. The deep security
credentials should be used for overcoming the problems of cyber-attack and failure of the
IOT environment. Transport layer security is the main area of implementing security
parameter because the handling of the applications is done through the TLS layer.
Transport layer Security TLS:
The designing of the transport layer protocol depends on the secure socket layer protocol
used in preserving the data and information stored in the application. The POODLE attack is
the major attack which affects the functioning of the Secure socket layer (SSL)/TLS in the
IOT environment. The POODLE attack is equipped with the cipher block chaining
with the sensor devices for having intelligence. It helps in managing the real time
communication and creating the virtual environment for the physical devices. The automation
and intelligence in the physical devices brings the industrial revolution which is called as
industry 4.0. The cyber-physical system (CPS) can be developed with the integration between
the smart devices which relatively helps in developing the smart factory. The presence of
vulnerabilities is the major concern for the CPS environment. The sensor devices are used for
developing connection between the physical world and virtual world. The deep security
credentials should be used for overcoming the problems of cyber-attack and failure of the
IOT environment. Transport layer security is the main area of implementing security
parameter because the handling of the applications is done through the TLS layer.
Transport layer Security TLS:
The designing of the transport layer protocol depends on the secure socket layer protocol
used in preserving the data and information stored in the application. The POODLE attack is
the major attack which affects the functioning of the Secure socket layer (SSL)/TLS in the
IOT environment. The POODLE attack is equipped with the cipher block chaining
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
encryption methodology which can affect the accuracy of the data and information stored in
the SSL layer. The working of the TLS layer is comprised of three steps which are named as
deployment of the key exchange algorithm, managing cipher text, and developing
authentication code for the message. The POODLE attack results in disturbing the managing
the interoperations and compatibility. The block padding results in defining the handshaking
protocol. The man-in-the middle attack occurred in defining the vulnerability in sending the
connection between the sender and destination. The data is transferred between the layers in
the encrypted format. Public private key pair is created for the exchange of information for
encrypting the data (Alfaqih, and Muhtadi, 2016). The TLS_Method are used for managing
the connections between the devices. Unencrypted socket are created for loading the private
key to manage the call for certification. Communication channels are the major concern area
for the attack surface. The access control policies should be developed for managing the
vulnerabilities at the IOT attack surface. The data should be detected at high risks. The
authorization and authentication protocol should be checked for minimizing the data
leakages. The defence mechanism should be developed as follows:
ï‚· Development of the administrative interface: The attack vectors are analysed with
respect to the malicious activities. The network server helps in managing the web
interface for the transfer of file from client to destination.
ï‚· Interface of the devices: Managing vulnerabilities to develop the interface for the
credential management of the devices
ï‚· Web interface for the cloud devices: The transport encryption policies should be
developed by applying the two factor authentication algorithm. The ineffective
encryption policies will result in the entrance of the vulnerabilities and cyber-attacks.
ï‚· Development of the mobile applications: The low cyber securities parameters may be
broken down by the denial of service attacks and other cyber-attacks which can
directly affect the application program (Gomez, Moret, Crowcroft, 2015).
ï‚· Network facilities and services: The service management program should be
developed for managing the denial of service attack, man in the middle attack, buffer
overflow, malfunctioning of the computer program, and others.
TLS Vulnerabilities and attacks:
The transport layer security of the IOT infrastructure is comprised of various vulnerabilities
which should be integrated in a specified format. The information of the IOT infrastructure is
the SSL layer. The working of the TLS layer is comprised of three steps which are named as
deployment of the key exchange algorithm, managing cipher text, and developing
authentication code for the message. The POODLE attack results in disturbing the managing
the interoperations and compatibility. The block padding results in defining the handshaking
protocol. The man-in-the middle attack occurred in defining the vulnerability in sending the
connection between the sender and destination. The data is transferred between the layers in
the encrypted format. Public private key pair is created for the exchange of information for
encrypting the data (Alfaqih, and Muhtadi, 2016). The TLS_Method are used for managing
the connections between the devices. Unencrypted socket are created for loading the private
key to manage the call for certification. Communication channels are the major concern area
for the attack surface. The access control policies should be developed for managing the
vulnerabilities at the IOT attack surface. The data should be detected at high risks. The
authorization and authentication protocol should be checked for minimizing the data
leakages. The defence mechanism should be developed as follows:
ï‚· Development of the administrative interface: The attack vectors are analysed with
respect to the malicious activities. The network server helps in managing the web
interface for the transfer of file from client to destination.
ï‚· Interface of the devices: Managing vulnerabilities to develop the interface for the
credential management of the devices
ï‚· Web interface for the cloud devices: The transport encryption policies should be
developed by applying the two factor authentication algorithm. The ineffective
encryption policies will result in the entrance of the vulnerabilities and cyber-attacks.
ï‚· Development of the mobile applications: The low cyber securities parameters may be
broken down by the denial of service attacks and other cyber-attacks which can
directly affect the application program (Gomez, Moret, Crowcroft, 2015).
ï‚· Network facilities and services: The service management program should be
developed for managing the denial of service attack, man in the middle attack, buffer
overflow, malfunctioning of the computer program, and others.
TLS Vulnerabilities and attacks:
The transport layer security of the IOT infrastructure is comprised of various vulnerabilities
which should be integrated in a specified format. The information of the IOT infrastructure is
comprised of three parameters which are classified as confidentiality, availability, and
integrity. The storing and processing of the information should take place for managing the
authentication and authorization of the data (Aneela, Anusha, Malavika, and Saripalle, 2017).
The stored information can be exploited by the vulnerabilities and association of the
malicious activities. The security violation can affect the integrity and accuracy of the data
stored in the applications. Some of the common vulnerabilities are listed below:
ï‚· Authentication: In authentication, the control on the working of the processes and
procedures is lost by the user. The third party can access the control over the
operational functionality of the applications. The reason behind the loss of
authentication is due to the use of weak password, data leakages, two-factor
authentication protocol, and log out by the user is not done.
ï‚· Eavesdropping: The communication between the IOT devices is done in the
interrupted format due to the occurrence of tampering by the third party. The
configuration of the encryption procedure is not properly done. The implementation
of the encryption methods is not properly done.
ï‚· During the Updating process: The updating of the IOT devices is done without
sending any prior message is the type of attack by the third party. The authenticated
methods are not used for getting remote control on managing the communication
between the sensor devices.
ï‚· Physical accessing of the information: The information is extracted through the
firmware for gaining device control through the interlocking of the devices. The
device management program is the failure in providing security to the information due
to lack of physical storage control.
ï‚· Device Management System: The denial of service attacks occurs in an IOT network
for managing the command information. The applications are in-secured in storing the
information. The third party attack can occur in managing the security control. The
systematic control should be applied for defining the information storage units. The
complexity of the information for streamlining the control over the applications.
The POODLE attack results in disturbing the managing the interoperations and compatibility.
The block padding results in defining the handshaking protocol. The man-in-the middle
attack occurred in defining the vulnerability in sending the connection between the sender
and destination. The downgrading of the information results in the vulnerabilities on the
secure socket layer (Kothmayr, Hu, Schmitt, Bruenig, 2011). The message authentication
integrity. The storing and processing of the information should take place for managing the
authentication and authorization of the data (Aneela, Anusha, Malavika, and Saripalle, 2017).
The stored information can be exploited by the vulnerabilities and association of the
malicious activities. The security violation can affect the integrity and accuracy of the data
stored in the applications. Some of the common vulnerabilities are listed below:
ï‚· Authentication: In authentication, the control on the working of the processes and
procedures is lost by the user. The third party can access the control over the
operational functionality of the applications. The reason behind the loss of
authentication is due to the use of weak password, data leakages, two-factor
authentication protocol, and log out by the user is not done.
ï‚· Eavesdropping: The communication between the IOT devices is done in the
interrupted format due to the occurrence of tampering by the third party. The
configuration of the encryption procedure is not properly done. The implementation
of the encryption methods is not properly done.
ï‚· During the Updating process: The updating of the IOT devices is done without
sending any prior message is the type of attack by the third party. The authenticated
methods are not used for getting remote control on managing the communication
between the sensor devices.
ï‚· Physical accessing of the information: The information is extracted through the
firmware for gaining device control through the interlocking of the devices. The
device management program is the failure in providing security to the information due
to lack of physical storage control.
ï‚· Device Management System: The denial of service attacks occurs in an IOT network
for managing the command information. The applications are in-secured in storing the
information. The third party attack can occur in managing the security control. The
systematic control should be applied for defining the information storage units. The
complexity of the information for streamlining the control over the applications.
The POODLE attack results in disturbing the managing the interoperations and compatibility.
The block padding results in defining the handshaking protocol. The man-in-the middle
attack occurred in defining the vulnerability in sending the connection between the sender
and destination. The downgrading of the information results in the vulnerabilities on the
secure socket layer (Kothmayr, Hu, Schmitt, Bruenig, 2011). The message authentication
code protocol is used for converting the plaintext into cipher text. 256 byte formats should be
prepared for encrypting and decrypting the information. The cookies are generated for
managing the session and transfer of sensitive data from host to the clients. The focus should
be given on developing the physical layer security parameters for preventing the entrance of
the vulnerabilities in the IOT infrastructure. The protocols should be designed for preserving
the security of the transport layer protocol. The highest priority system should be used for
managing the encryption and decryption of the information between the sensor devices. The
vulnerabilities are added in the information stream stored in the transport layer security. The
compression ratio is used for compressing the information to manage secured connection
between the sender and receiver. The integrity and security is used for managing the
information to handle large amount of information effectively between the various devices.
The replication of the information can be controlled by identifying the value of compression
ratio. The third party focuses on identifying the cookie session managed between the sender
and receiver for getting the response of the cookie value. The breaches attack on the TLS
layer can be identified by demonstrating the level of compression technologies used in
managing the HTTP request. The reflection of HTTP response should be collected from the
sender side. The time period of the cookie session should be identified for calculating the
impact of the attack on the TLS layer (Santos, and et.al., 2015). The Vulnerabilities on the
TLS layer can be controlled by disabling the HTTP compression protocols. The secret
information can be obtained for the user defined input. The random number is generated for
preserving the protocols for identifying the request response. The XOR operations are
performed for masking the data value. The chart below shows the type of attacks associated
with the IOT architecture:
prepared for encrypting and decrypting the information. The cookies are generated for
managing the session and transfer of sensitive data from host to the clients. The focus should
be given on developing the physical layer security parameters for preventing the entrance of
the vulnerabilities in the IOT infrastructure. The protocols should be designed for preserving
the security of the transport layer protocol. The highest priority system should be used for
managing the encryption and decryption of the information between the sensor devices. The
vulnerabilities are added in the information stream stored in the transport layer security. The
compression ratio is used for compressing the information to manage secured connection
between the sender and receiver. The integrity and security is used for managing the
information to handle large amount of information effectively between the various devices.
The replication of the information can be controlled by identifying the value of compression
ratio. The third party focuses on identifying the cookie session managed between the sender
and receiver for getting the response of the cookie value. The breaches attack on the TLS
layer can be identified by demonstrating the level of compression technologies used in
managing the HTTP request. The reflection of HTTP response should be collected from the
sender side. The time period of the cookie session should be identified for calculating the
impact of the attack on the TLS layer (Santos, and et.al., 2015). The Vulnerabilities on the
TLS layer can be controlled by disabling the HTTP compression protocols. The secret
information can be obtained for the user defined input. The random number is generated for
preserving the protocols for identifying the request response. The XOR operations are
performed for masking the data value. The chart below shows the type of attacks associated
with the IOT architecture:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
The following table shows the layer wise attacks on the IOT architecture:
The message authentication process can be managed by ensuring the flow of data packets
between the client and server in sequence in the format of frame counter. The IOT
architecture depends upon the integration between the computing devices and digital
machines which are provided with the unique identifiers for creating the smooth
communication links between the devices. The human to human and human to machine
requires accuracy in managing the communication between the host and destination machines
(Kamel, and Hegazi, 2015).The transport layer security paradigm is composed of three
protocols which are named as Handshaking protocol, change cipher protocol, and alert
between the client and server in sequence in the format of frame counter. The IOT
architecture depends upon the integration between the computing devices and digital
machines which are provided with the unique identifiers for creating the smooth
communication links between the devices. The human to human and human to machine
requires accuracy in managing the communication between the host and destination machines
(Kamel, and Hegazi, 2015).The transport layer security paradigm is composed of three
protocols which are named as Handshaking protocol, change cipher protocol, and alert
protocol. The handshaking protocol is used for acknowledging the retrieval of secured
information from the server. The process control unit is prepared for managing the sequence
of data packets according to their frame counter. The information is extracted through the
firmware for gaining device control through the interlocking of the devices. The device
management program is the failure in providing security to the information due to lack of
physical storage control. The change cipher protocol is used for analysing the value of cipher
text should be same to the send by the sender. The error messages are generated in case
difference in the cipher text had been occurred. It helps in minimizing the failure of the IOT
system. The undated cipher suite can be organized at the destination so that accurate
information can be provided according to the requirement. The alert protocol is used for
sending alert signal in case error occurred in the message transfer system. The connection can
be terminated if malicious code is added to the frame send by the server (Salah, and Khan,
2017). The internet of service helps in developing the smart factory by managing the
effective operation between the devices such as Supply chain management system, Enterprise
resource planning system, and others. The record of the information is handled in the record
table by specifying the information in the record header to fetch relevant information. The
session is developed between the server and client for sending the information. The keys are
exchanged for securing the session and authenticating the client for message transfer. The
detection of malicious activity at an early stage helps in increasing the efficiency of
connectionless service organized between the sender and the receiver. The flow of data and
information can be controlled by implementing the sliding window and go back n protocol
between the IOT interfaces. The error can be controlled by adding the checksum and
acknowledgement through the use of handshaking protocol. The addressing of port number
helps in ensuring the unique ID number of the devices to manage relevant communication.
information from the server. The process control unit is prepared for managing the sequence
of data packets according to their frame counter. The information is extracted through the
firmware for gaining device control through the interlocking of the devices. The device
management program is the failure in providing security to the information due to lack of
physical storage control. The change cipher protocol is used for analysing the value of cipher
text should be same to the send by the sender. The error messages are generated in case
difference in the cipher text had been occurred. It helps in minimizing the failure of the IOT
system. The undated cipher suite can be organized at the destination so that accurate
information can be provided according to the requirement. The alert protocol is used for
sending alert signal in case error occurred in the message transfer system. The connection can
be terminated if malicious code is added to the frame send by the server (Salah, and Khan,
2017). The internet of service helps in developing the smart factory by managing the
effective operation between the devices such as Supply chain management system, Enterprise
resource planning system, and others. The record of the information is handled in the record
table by specifying the information in the record header to fetch relevant information. The
session is developed between the server and client for sending the information. The keys are
exchanged for securing the session and authenticating the client for message transfer. The
detection of malicious activity at an early stage helps in increasing the efficiency of
connectionless service organized between the sender and the receiver. The flow of data and
information can be controlled by implementing the sliding window and go back n protocol
between the IOT interfaces. The error can be controlled by adding the checksum and
acknowledgement through the use of handshaking protocol. The addressing of port number
helps in ensuring the unique ID number of the devices to manage relevant communication.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Chapter 3: Research Methodology
The study of the literature review helps in developing the taxonomy of the cyber-attacks
which are associated in the construction of the secure socket layer and transport layer security
system. The creation of taxonomy helps in analysing the impact of the attacks on the IOT
environment. The security challenges are categorised into three levels which are named as
lower level security challenges, medium level security challenges, and higher level security
challenges.
Lower Level Security Challenges:
The lower level security challenges are focuses on the attacks which directly affect the
functioning of the physical and data link layer in managing the association of hardware and
software components. The security attacks are stated in the table below:
Lower Level Security
Challenges
Description
Jamming attacks This type of attacks focuses on finding the gaps and
leakages in the wireless devices. The information can be
hacked through the radio signals sent to the network layer
for managing the required operations and functions
System Initialization The privacy and accuracy of the system can be affected
during the system initialization due to the use of ineffective
security protocols and providing unauthorised access to the
receivers. The unauthorised accessing of the application
will results in unpredictable activities (Kamel and Hegazi,
2018).
Spoofing attacks The malfunctioning of the IOT infrastructure occurs due to
the occurrence of the spoofing attacks. The association of
the network resources get depleted due to the denying in
providing the required access to the resources.
Insecurity associated with the The functioning of the IOT architecture get affected due to
The study of the literature review helps in developing the taxonomy of the cyber-attacks
which are associated in the construction of the secure socket layer and transport layer security
system. The creation of taxonomy helps in analysing the impact of the attacks on the IOT
environment. The security challenges are categorised into three levels which are named as
lower level security challenges, medium level security challenges, and higher level security
challenges.
Lower Level Security Challenges:
The lower level security challenges are focuses on the attacks which directly affect the
functioning of the physical and data link layer in managing the association of hardware and
software components. The security attacks are stated in the table below:
Lower Level Security
Challenges
Description
Jamming attacks This type of attacks focuses on finding the gaps and
leakages in the wireless devices. The information can be
hacked through the radio signals sent to the network layer
for managing the required operations and functions
System Initialization The privacy and accuracy of the system can be affected
during the system initialization due to the use of ineffective
security protocols and providing unauthorised access to the
receivers. The unauthorised accessing of the application
will results in unpredictable activities (Kamel and Hegazi,
2018).
Spoofing attacks The malfunctioning of the IOT infrastructure occurs due to
the occurrence of the spoofing attacks. The association of
the network resources get depleted due to the denying in
providing the required access to the resources.
Insecurity associated with the The functioning of the IOT architecture get affected due to
physical interfaces the entry of the vulnerabilities and malicious code from the
physical interface. The security protocol is not effective at
the physical interface
Sleep Attack The sleep attacks occur on the sensor devices used in the
creation of the IOT architecture. The vulnerabilities get
associated with the different sensor devices used in the
development of the IOT environment.
Middle level attack:
The table below shows the list of middle level attacks:
Middle Level attacks Description
Fragmentation The fragmented data packets can be easily fetched by the
third party by gaining access through the data leakages. The
duplicated data packets are developed by adding malicious
code to them to add vulnerabilities and malfunctioning of
the IOT networks
Memory buffer reservation
attack
The memory reserved for the data packets get wasted by
sending incomplete data or malicious data at the destination
location.
Routing protocol attack The routing protocol can create Lossy network which can
be triggered easily by the vulnerabilities. The
eavesdropping type of attacks occurs in using the RPL
protocol
Wormhole attack The request and response generated through the malicious
program will results in the malfunctioning of the IOT
network and terminologies
Sybil attack The performance of the network get violated due to the
occurrence of Sybil node in managing the phishing attacks
Authentication attack The datagram transport layer is used for managing the flow
of data packets to increase the availability of the resources
among the users. The loop holes in the protocol will results
in malfunctioning of the IOT architecture.
physical interface. The security protocol is not effective at
the physical interface
Sleep Attack The sleep attacks occur on the sensor devices used in the
creation of the IOT architecture. The vulnerabilities get
associated with the different sensor devices used in the
development of the IOT environment.
Middle level attack:
The table below shows the list of middle level attacks:
Middle Level attacks Description
Fragmentation The fragmented data packets can be easily fetched by the
third party by gaining access through the data leakages. The
duplicated data packets are developed by adding malicious
code to them to add vulnerabilities and malfunctioning of
the IOT networks
Memory buffer reservation
attack
The memory reserved for the data packets get wasted by
sending incomplete data or malicious data at the destination
location.
Routing protocol attack The routing protocol can create Lossy network which can
be triggered easily by the vulnerabilities. The
eavesdropping type of attacks occurs in using the RPL
protocol
Wormhole attack The request and response generated through the malicious
program will results in the malfunctioning of the IOT
network and terminologies
Sybil attack The performance of the network get violated due to the
occurrence of Sybil node in managing the phishing attacks
Authentication attack The datagram transport layer is used for managing the flow
of data packets to increase the availability of the resources
among the users. The loop holes in the protocol will results
in malfunctioning of the IOT architecture.
Transport end to end data
packets attack
The transport layer protocol is used for providing the end-to
end security to the flow of data packets for increasing the
reliability of the information. The data holes in the
messages can create the violation of the information
accuracy (Kim, 2017)
Session establishment attack The session established between the sender and the receiver
can be hijacked by the third party by getting unauthorised
access of the information
Violation of privacy and
accuracy
The data on the network can be violated by the third party
by adding malicious code in the software and in the transfer
process of data packets.
Higher level attacks:
Higher level attacks Description
Constraint application protocol
attack
The constrained application protocol is used for managing
the information binding between the constrained devices.
The encrypted messages are generated for securing the
communication between the devices. The decryption of the
messages can create loss of information accuracy and
privacy.
Development of insecure
gateways and interfaces
The physical interfaces between the devices and cloud
environment can create the loss of data accuracy due to the
use of insecure protocols and data procedures
Insecure software tools The updated version of the software is not used in the
construction of the IOT environment which gives the
chance to the hackers to get access of the devices and
information
Middleware security protocol The services and communication between the devices are
not securely managed between the sender and receiver.
The analysis of the different types of attacks associated on the different layers of the IOT
infrastructure helps in analysing the gaps in the protocols and interfaces used to establish
packets attack
The transport layer protocol is used for providing the end-to
end security to the flow of data packets for increasing the
reliability of the information. The data holes in the
messages can create the violation of the information
accuracy (Kim, 2017)
Session establishment attack The session established between the sender and the receiver
can be hijacked by the third party by getting unauthorised
access of the information
Violation of privacy and
accuracy
The data on the network can be violated by the third party
by adding malicious code in the software and in the transfer
process of data packets.
Higher level attacks:
Higher level attacks Description
Constraint application protocol
attack
The constrained application protocol is used for managing
the information binding between the constrained devices.
The encrypted messages are generated for securing the
communication between the devices. The decryption of the
messages can create loss of information accuracy and
privacy.
Development of insecure
gateways and interfaces
The physical interfaces between the devices and cloud
environment can create the loss of data accuracy due to the
use of insecure protocols and data procedures
Insecure software tools The updated version of the software is not used in the
construction of the IOT environment which gives the
chance to the hackers to get access of the devices and
information
Middleware security protocol The services and communication between the devices are
not securely managed between the sender and receiver.
The analysis of the different types of attacks associated on the different layers of the IOT
infrastructure helps in analysing the gaps in the protocols and interfaces used to establish
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
connection between the sensor devices. The vulnerabilities added to the IOT network can
affect the malfunctioning of the sensor devices, physical devices, and network components
(Lopez, and et.al, 2018). The focus should be given on developing the security solution which
is capable of managing the secured communication between the sensor devices.
The qualitative methodology helps in collecting data from different formats such as literature
review, web surfing, interviews, and face to face communication.
Literature Review: The study of the literature review helps in identifying the area of concern
and problematic scenario in the construction of the IOT environment. It helps in finding out
different types of attacks which can violate the operational functioning of the TLS security
protocol and accuracy of the information required in the communication between the sensor
devices.
Web-Surfing: The data can be collected about the TLS security and the vulnerabilities
associated with the IOT architecture can be collected by doing web-surfing. It helps in
tracking the research which is completed in managing the security of the transport layer for
providing authenticating communication between the sender and receiver.
Interviews: The interviews are arranged with the project owner of the industries 4.0 whose
working depends on the IOT environment. It helps in finding out the gaps and concern areas
of managing communication between the sensor devices. The ideas and innovative thoughts
can be collected to implement in the designing of the algorithm which is capable of
minimizing the entrance of the third party in the IOT environment by securing the transport
layer protocol.
Face to face communication: The round table discussion helps in predicting the areas of
concerns and historical methods used by the attackers to get inside the IOT environment by
adding malicious activities. The point of data leakages can be taken into consideration and
helps in designing the significant approach which helps in overcoming the problem of
insecurity of the communication between the sensor devices.
affect the malfunctioning of the sensor devices, physical devices, and network components
(Lopez, and et.al, 2018). The focus should be given on developing the security solution which
is capable of managing the secured communication between the sensor devices.
The qualitative methodology helps in collecting data from different formats such as literature
review, web surfing, interviews, and face to face communication.
Literature Review: The study of the literature review helps in identifying the area of concern
and problematic scenario in the construction of the IOT environment. It helps in finding out
different types of attacks which can violate the operational functioning of the TLS security
protocol and accuracy of the information required in the communication between the sensor
devices.
Web-Surfing: The data can be collected about the TLS security and the vulnerabilities
associated with the IOT architecture can be collected by doing web-surfing. It helps in
tracking the research which is completed in managing the security of the transport layer for
providing authenticating communication between the sender and receiver.
Interviews: The interviews are arranged with the project owner of the industries 4.0 whose
working depends on the IOT environment. It helps in finding out the gaps and concern areas
of managing communication between the sensor devices. The ideas and innovative thoughts
can be collected to implement in the designing of the algorithm which is capable of
minimizing the entrance of the third party in the IOT environment by securing the transport
layer protocol.
Face to face communication: The round table discussion helps in predicting the areas of
concerns and historical methods used by the attackers to get inside the IOT environment by
adding malicious activities. The point of data leakages can be taken into consideration and
helps in designing the significant approach which helps in overcoming the problem of
insecurity of the communication between the sensor devices.
Chapter 4: Research Analysis and approach
In this chapter, we will focus on the working of the IOT infrastructure and managing the
association of the different sensor devices. The dependence of the network devices is
managed through the local central system and global central system. The accessing of the
information can be done through the use of authentication protocol. The cryptographic keys
and session keys should be developed for organizing the validity and verification of the
activity sources. The registration of the sensor devices should be done on the IOT domain.
The diagram below shows the association of the IOT infrastructure through the local
centralized control and global authentication and authorization platform.
The credentials of the session keys are used for managing the flow of information in the
personal area network. The Transport control protocol (TCP) and user datagram protocol
(UDP) are used for securing the transmission process of data packets. The configuration of
the devices should be registered for securing the flow of information to the destination. The
In this chapter, we will focus on the working of the IOT infrastructure and managing the
association of the different sensor devices. The dependence of the network devices is
managed through the local central system and global central system. The accessing of the
information can be done through the use of authentication protocol. The cryptographic keys
and session keys should be developed for organizing the validity and verification of the
activity sources. The registration of the sensor devices should be done on the IOT domain.
The diagram below shows the association of the IOT infrastructure through the local
centralized control and global authentication and authorization platform.
The credentials of the session keys are used for managing the flow of information in the
personal area network. The Transport control protocol (TCP) and user datagram protocol
(UDP) are used for securing the transmission process of data packets. The configuration of
the devices should be registered for securing the flow of information to the destination. The
network architecture of the industry 4.0 is based on authorization control policies between the
different platforms of the IOT environment. The diagram below shows the systematic
construction of the authorization system in the development of communication between the
destination sources to minimize the unauthorised accessing of the information.
The working of the authorization process at the transport layer results in managing the
security and authenticity of the information at the IOT network. The handling of the
authorization services helps in defining the cryptographic keys and session keys between the
working environment. The accessing of the information can be effectively done through the
session keys and crypto keys to manage the accuracy and authenticity of the information. The
figure below shows the process of authentication and authorization in carrying out secure
communication between the sensor devices of the industry 4.0.
different platforms of the IOT environment. The diagram below shows the systematic
construction of the authorization system in the development of communication between the
destination sources to minimize the unauthorised accessing of the information.
The working of the authorization process at the transport layer results in managing the
security and authenticity of the information at the IOT network. The handling of the
authorization services helps in defining the cryptographic keys and session keys between the
working environment. The accessing of the information can be effectively done through the
session keys and crypto keys to manage the accuracy and authenticity of the information. The
figure below shows the process of authentication and authorization in carrying out secure
communication between the sensor devices of the industry 4.0.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Working of SSL/TLS layer:
The session keys are used for establishing the connection between the sender and the clients
to authorise the access control in organizing the data packets between them. The accessing of
the information can be done through the authorised control by implementing the pair of
session keys. It helps in increasing the reliability of the information (Sfar, Natalizio, Challal,
and Chtourou, 2015). The request and response of the information can be balanced by having
information of the accessor. The common server is used for sending the information between
the different nodes of devices. It helps in increasing the reliability of the information. The
diagram below shows the structure of process which is used for managing the secure
connection between the sender and the clients.
The session keys are used for establishing the connection between the sender and the clients
to authorise the access control in organizing the data packets between them. The accessing of
the information can be done through the authorised control by implementing the pair of
session keys. It helps in increasing the reliability of the information (Sfar, Natalizio, Challal,
and Chtourou, 2015). The request and response of the information can be balanced by having
information of the accessor. The common server is used for sending the information between
the different nodes of devices. It helps in increasing the reliability of the information. The
diagram below shows the structure of process which is used for managing the secure
connection between the sender and the clients.
The response given by the clients can be securely transmitted to the accessor by having the
secure communication. The unauthorised accessing of information through different means
will results in cyber-attacks on the communication process. The strong session keys should be
developed for managing the privacy of the information. The focus should be given on
managing the configuration of the security procedure used in building the secured IOT
network (Siddiqui, and Allazzawi, 2018). The TCP and UDP protocols are used for securing
and increasing reliability of the key distribution. The privilege should be given on identifying
the session keys associated between the users. There are various challenges and issues which
exist in the path of managing the secured communication through the reliable TCP and UDP
protocol such as Heterogeneity of the devices, key distribution, complexity of the session
keys, and others.
The reliable protocols can be developed by minimizing the high safety risks, resource
constrained, sensitivity of the information, and broadcasting of the information on different
IOT platform. The strength of the protocol can be developed by configuring the key
distributed format, strength of the crypto keys, session keys, identification of the key owners,
managing cache key information, and others. The authentication and authorization of the TLS
helps in managing the scalability of the IOT devices, improving the operational and
functional program by sharing of keys, balancing data traffic, and flow control of the
information. The diagram below shows the security management system with respect to the
Transport layer security system.
secure communication. The unauthorised accessing of information through different means
will results in cyber-attacks on the communication process. The strong session keys should be
developed for managing the privacy of the information. The focus should be given on
managing the configuration of the security procedure used in building the secured IOT
network (Siddiqui, and Allazzawi, 2018). The TCP and UDP protocols are used for securing
and increasing reliability of the key distribution. The privilege should be given on identifying
the session keys associated between the users. There are various challenges and issues which
exist in the path of managing the secured communication through the reliable TCP and UDP
protocol such as Heterogeneity of the devices, key distribution, complexity of the session
keys, and others.
The reliable protocols can be developed by minimizing the high safety risks, resource
constrained, sensitivity of the information, and broadcasting of the information on different
IOT platform. The strength of the protocol can be developed by configuring the key
distributed format, strength of the crypto keys, session keys, identification of the key owners,
managing cache key information, and others. The authentication and authorization of the TLS
helps in managing the scalability of the IOT devices, improving the operational and
functional program by sharing of keys, balancing data traffic, and flow control of the
information. The diagram below shows the security management system with respect to the
Transport layer security system.
It helps in finding out key distribution among the client and authorization parties. The session
should be developed between the server and client for authenticating the flow of information
by implementing the handshaking protocol (Panarllo, Tapas, Merlino, Longo, and Puliafito,
2018). The random values are generated for providing authority to the member participants.
Challenges in securing the transport layer protocol in industry 4.0.:
The table below shows the list of challenges in managing the security of TLS in IOT
environment.
Challenges Description
Heterogeneous environment The IOT architecture is comprised of various
heterogeneous configuration devices to manage the
flow of information between the sensor devices. The
cryptographic keys and session keys are developed for
managing the flow of information between the devices.
The strength and complexities of the keys configuration
should be focused. The complexity of the IOT
environment depends on distribution and management
should be developed between the server and client for authenticating the flow of information
by implementing the handshaking protocol (Panarllo, Tapas, Merlino, Longo, and Puliafito,
2018). The random values are generated for providing authority to the member participants.
Challenges in securing the transport layer protocol in industry 4.0.:
The table below shows the list of challenges in managing the security of TLS in IOT
environment.
Challenges Description
Heterogeneous environment The IOT architecture is comprised of various
heterogeneous configuration devices to manage the
flow of information between the sensor devices. The
cryptographic keys and session keys are developed for
managing the flow of information between the devices.
The strength and complexities of the keys configuration
should be focused. The complexity of the IOT
environment depends on distribution and management
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
of keys, strength of the cryptographic keys, managing
session keys, and cache keys (Khalid, 2016).
Open Environment It is difficult to keep track of request placed by the
devices in the IOT environment. It is difficult to keep
track of intrusion in the wireless environment and in
the association of sensor devices.
Scalability The problem of scalability arises due to the increasing
association of the sensor devices in an open
environment. The session keys are developed for
handling operations between the client and the server.
The focus should be given on strengthening the crypto
keys.
Authorization and authentication The registration of the devices is done for developing
the session keys between the client and server to
provide authorization and authentication for managing
the flow of information.
Security The accuracy of the IOT environment depends on
managing the secure communication between the
devices. It is difficult to handle accuracy in managing
request and response model. The sequence numbers of
applications are generated for enabling the client and
server communication (Shifa, 2015).
session keys, and cache keys (Khalid, 2016).
Open Environment It is difficult to keep track of request placed by the
devices in the IOT environment. It is difficult to keep
track of intrusion in the wireless environment and in
the association of sensor devices.
Scalability The problem of scalability arises due to the increasing
association of the sensor devices in an open
environment. The session keys are developed for
handling operations between the client and the server.
The focus should be given on strengthening the crypto
keys.
Authorization and authentication The registration of the devices is done for developing
the session keys between the client and server to
provide authorization and authentication for managing
the flow of information.
Security The accuracy of the IOT environment depends on
managing the secure communication between the
devices. It is difficult to handle accuracy in managing
request and response model. The sequence numbers of
applications are generated for enabling the client and
server communication (Shifa, 2015).
Chapter 5: Proposed Solution
The designing of the secured architecture for Transport layer to manage security of the
industry 4.0 depends on the process of authorization. The authentication and authorization
should be managed between different sensor networks to enable accessibility and operations.
Authorization Process: The authentication and authorization process depends on developing
the registration of the entities in the sensor networks. The access control policies should be
developed for accessing the desired information from the database. The operational efficiency
and security of the system can be improved by managing the authorized communication
between entities. The cryptographic keys should be generated by developing the unique
identifiers between the entities. The security to the IOT networks can be provided by
implementing the security process in four phases which are classified as:
ï‚· Registration of entities: The registration of the entities and new devices should be
done first so that the sequence number of the entity can be generated for managing
communication between them.
ï‚· Session key distribution: The session keys should be generated between the client and
server for managing authorized communication between them (Shang, Yu, and
Droms, 2016).
ï‚· Initialization of communication: The request and response model should be initialized
within the given timeline. The protected messages should be sent between the entities
so that the data leakages can be minimized.
ï‚· Secure communication: The cryptographic keys are developed for protecting the
messages between the client and server. The secured communication can be done by
sending the protected messages.
The diagram below shows the operational view of four phases which should be done for
securing the accuracy of the IOT environment.
The designing of the secured architecture for Transport layer to manage security of the
industry 4.0 depends on the process of authorization. The authentication and authorization
should be managed between different sensor networks to enable accessibility and operations.
Authorization Process: The authentication and authorization process depends on developing
the registration of the entities in the sensor networks. The access control policies should be
developed for accessing the desired information from the database. The operational efficiency
and security of the system can be improved by managing the authorized communication
between entities. The cryptographic keys should be generated by developing the unique
identifiers between the entities. The security to the IOT networks can be provided by
implementing the security process in four phases which are classified as:
ï‚· Registration of entities: The registration of the entities and new devices should be
done first so that the sequence number of the entity can be generated for managing
communication between them.
ï‚· Session key distribution: The session keys should be generated between the client and
server for managing authorized communication between them (Shang, Yu, and
Droms, 2016).
ï‚· Initialization of communication: The request and response model should be initialized
within the given timeline. The protected messages should be sent between the entities
so that the data leakages can be minimized.
ï‚· Secure communication: The cryptographic keys are developed for protecting the
messages between the client and server. The secured communication can be done by
sending the protected messages.
The diagram below shows the operational view of four phases which should be done for
securing the accuracy of the IOT environment.
The security of the devices can be managed by handling the registration of entities effectively
so that the session between the client and server can be developed for authorising the flow of
information and avoid entry to vulnerabilities and malicious code. The authentication to the
devices helps in managing database tables for entry of the new sensor devices. The
communication process can be set up between the client and server by managing request and
response system (Ray, 2016). The public and private key pair is developed for wrapping the
messages in the encrypted form. The session keys are used for keeping the security of
information and data between the client and server by developing the communication session
between them. The distribution keys are used for distributing the encrypted data within the
session period between the devices so that vulnerabilities cannot be added to the IOT secured
platform. The session IDs is generated for authenticating and validating the flow of
information through the transport layer security system. The new registration of the IOT
devices should follow all the steps to be authenticated part of the system (Zhang, 2016).
The diagram below shows the database schema which should be developed for developing
the cache session keys, registration of the entities, managing communication between the
client and server, and defining trusted authenticated primary key.
so that the session between the client and server can be developed for authorising the flow of
information and avoid entry to vulnerabilities and malicious code. The authentication to the
devices helps in managing database tables for entry of the new sensor devices. The
communication process can be set up between the client and server by managing request and
response system (Ray, 2016). The public and private key pair is developed for wrapping the
messages in the encrypted form. The session keys are used for keeping the security of
information and data between the client and server by developing the communication session
between them. The distribution keys are used for distributing the encrypted data within the
session period between the devices so that vulnerabilities cannot be added to the IOT secured
platform. The session IDs is generated for authenticating and validating the flow of
information through the transport layer security system. The new registration of the IOT
devices should follow all the steps to be authenticated part of the system (Zhang, 2016).
The diagram below shows the database schema which should be developed for developing
the cache session keys, registration of the entities, managing communication between the
client and server, and defining trusted authenticated primary key.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
The session is developed for managing the flow of information between the client and server.
The key distribution helps in validating the communication between the devices. The unique
ID number is provided to the registered entities so that the communication session can be
developed between them. The session key table should be developed for keeping the
information of authenticated flow of information between the entities.
The table below shows the database table for the registration of the entities. The information
which are required for the registration of the entities are name, public key, expiry time of the
distribution keys, validity period of distribution keys, cipher algorithm used, Mac algorithm
used, operational conditions, and session period of different registered entities (Marksteiner,
Jimenez, Vallant, Zeiner, 2015).
The description of the attributes of the registered entities table is given below:
Attributes Description
Name of the entity The clear and concise name of the entity should be mentioned
Group name Name of the group to which the entity belongs
The key distribution helps in validating the communication between the devices. The unique
ID number is provided to the registered entities so that the communication session can be
developed between them. The session key table should be developed for keeping the
information of authenticated flow of information between the entities.
The table below shows the database table for the registration of the entities. The information
which are required for the registration of the entities are name, public key, expiry time of the
distribution keys, validity period of distribution keys, cipher algorithm used, Mac algorithm
used, operational conditions, and session period of different registered entities (Marksteiner,
Jimenez, Vallant, Zeiner, 2015).
The description of the attributes of the registered entities table is given below:
Attributes Description
Name of the entity The clear and concise name of the entity should be mentioned
Group name Name of the group to which the entity belongs
Distribution Protocol Network protocols are used for managing the authorised flow of
information at transport layer protocol
Permanent distribution
key
The Boolean values are allocated to the devices which are
authenticated entities. The updating of the devices is not required.
Request time session
key
The request session keys are developed for managing the
communication and authenticated flow of information between the
devices
Request time cache
session key
Cache session keys are used for developing communication with
number of devices at a time
Public and private key Public and private key pair are used for managing the data in the
encrypted format.
Validation period The validity period is developed between different authenticated
devices for managing the secured flow of information
Distributed
cryptographic
specification
MAC and Cipher text algorithm are used for managing the
authorised connection between the registered devices
Expiry time of
distributed key
Expiry time of the distributed key should be noticed
Key value Binary value should be provided to the devices and entities for
encrypting the data (Kim, 2016)
Communication Database Table:
The communication database tables are prepared for managing the validity period to send
authorised and authenticated data between the IOT devices. The communication program is
developed between the communication initiator and listener. The dynamic changes in the
communication links between the entities can be handled effectively. The session keys are
used for managing the absolute and validation period between the entities. The database table
given below shows authorised communication format to manage the session keys between the
entities:
information at transport layer protocol
Permanent distribution
key
The Boolean values are allocated to the devices which are
authenticated entities. The updating of the devices is not required.
Request time session
key
The request session keys are developed for managing the
communication and authenticated flow of information between the
devices
Request time cache
session key
Cache session keys are used for developing communication with
number of devices at a time
Public and private key Public and private key pair are used for managing the data in the
encrypted format.
Validation period The validity period is developed between different authenticated
devices for managing the secured flow of information
Distributed
cryptographic
specification
MAC and Cipher text algorithm are used for managing the
authorised connection between the registered devices
Expiry time of
distributed key
Expiry time of the distributed key should be noticed
Key value Binary value should be provided to the devices and entities for
encrypting the data (Kim, 2016)
Communication Database Table:
The communication database tables are prepared for managing the validity period to send
authorised and authenticated data between the IOT devices. The communication program is
developed between the communication initiator and listener. The dynamic changes in the
communication links between the entities can be handled effectively. The session keys are
used for managing the absolute and validation period between the entities. The database table
given below shows authorised communication format to manage the session keys between the
entities:
Session Key database table:
The session keys between the client and servers are managed and stored in the cache memory
for facilitating the flow of information between the registered entities. It helps in enabling the
authenticating and secured communication between the registered devices. The expiry time of
the session should be defined so that the entrance of vulnerabilities and malicious code
should be omitted between the session period and secured flow of information can takes
place. The diagram below shows the example of format used for developing the database
table for the session key:
Authentication table:
The authentication and authorization table should be developed for identifying the credentials
of security between the registered devices. The host name and port number should be defined
in the certification of authority. It helps in providing scalability to the authorised devices and
building trust between them.
The encrypted messages are sent to the client machine by managing the public and private
key architecture for securing the information at the transport layer. The cryptographic keys
and session keys are used for defining the encrypted session between the devices. The
message authentication codes are developed for converting the messages into cipher text. The
The session keys between the client and servers are managed and stored in the cache memory
for facilitating the flow of information between the registered entities. It helps in enabling the
authenticating and secured communication between the registered devices. The expiry time of
the session should be defined so that the entrance of vulnerabilities and malicious code
should be omitted between the session period and secured flow of information can takes
place. The diagram below shows the example of format used for developing the database
table for the session key:
Authentication table:
The authentication and authorization table should be developed for identifying the credentials
of security between the registered devices. The host name and port number should be defined
in the certification of authority. It helps in providing scalability to the authorised devices and
building trust between them.
The encrypted messages are sent to the client machine by managing the public and private
key architecture for securing the information at the transport layer. The cryptographic keys
and session keys are used for defining the encrypted session between the devices. The
message authentication codes are developed for converting the messages into cipher text. The
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
unique ID is generated for authenticating the session. The communication should be
initialized between the clients and server through the secure connection. The session keys are
used for handling the encrypted data and information. The transfer of data and information
from the secure socket layer and transport layer security in the encrypted format helps in
avoiding data leakages and addition of vulnerabilities to the information. The connection
between the client and server are developed for initializing the secure communication. The
messages are forwarded in the encrypted format with the help of key value. The distribution
keys are used for distributing the information and data with the registered client and server.
The unique ID is provided to develop the session for transfer of secured information and data.
The secure connection is developed on the secure socket layer and transport layer security
protocol for contributing the session. The distribution of session key is used for managing the
information on the client and server. The initialization of the communication process depends
on the session organized with the unique ID number of the entities. The session keys are used
for defining the authorization to the IOT devices. The security paradigm is accessed by four
entities which are named as secure common client, secure common server, secure publisher,
and secure subscribers.
Secure Common Client: The secure common client is used for sending request to the server
for getting secured information. The connection and session with the server is managed by
the client through the encrypted session and distribution keys.
initialized between the clients and server through the secure connection. The session keys are
used for handling the encrypted data and information. The transfer of data and information
from the secure socket layer and transport layer security in the encrypted format helps in
avoiding data leakages and addition of vulnerabilities to the information. The connection
between the client and server are developed for initializing the secure communication. The
messages are forwarded in the encrypted format with the help of key value. The distribution
keys are used for distributing the information and data with the registered client and server.
The unique ID is provided to develop the session for transfer of secured information and data.
The secure connection is developed on the secure socket layer and transport layer security
protocol for contributing the session. The distribution of session key is used for managing the
information on the client and server. The initialization of the communication process depends
on the session organized with the unique ID number of the entities. The session keys are used
for defining the authorization to the IOT devices. The security paradigm is accessed by four
entities which are named as secure common client, secure common server, secure publisher,
and secure subscribers.
Secure Common Client: The secure common client is used for sending request to the server
for getting secured information. The connection and session with the server is managed by
the client through the encrypted session and distribution keys.
Secure common server: The secure common server is used for sending response of request to
the client for getting secured information. The connection and session with the server is
managed by the client through the encrypted session and distribution keys.
Secure Publisher: The secure messages are published by the publisher by managing the
connection between the server and clients by sequencing the unique ID number of the
entities.
Secure Subscriber: The secure subscribers send the acknowledgement for receiving the
secured messages by the server. The subscription process is used for authentication of
the client for getting secured information. The connection and session with the server is
managed by the client through the encrypted session and distribution keys.
Secure Publisher: The secure messages are published by the publisher by managing the
connection between the server and clients by sequencing the unique ID number of the
entities.
Secure Subscriber: The secure subscribers send the acknowledgement for receiving the
secured messages by the server. The subscription process is used for authentication of
received messages. The status of the subscription can be checked for receiving the secured
messages without any vulnerabilities and malicious activities.
The replies of the server and clients are getting collected by organizing the cache session
keys for managing standard interface. The error codes are generated for transferring the
secured messages and data between the devices. The APIs are developed for retrieving the
secured information. The security and accuracy of the information can be retrieved by
implementing the secure communication accessors. The anomaly can be detected in the IOT
applications during the running of the devices at remote location. The confidentiality of the
information can be kept secured to identify the entrance of the vulnerabilities. The message
authenticity protocols are used for optimizing the security to the communication managed
between them (Chawngsangpuii, Das, Das, 2017).
messages without any vulnerabilities and malicious activities.
The replies of the server and clients are getting collected by organizing the cache session
keys for managing standard interface. The error codes are generated for transferring the
secured messages and data between the devices. The APIs are developed for retrieving the
secured information. The security and accuracy of the information can be retrieved by
implementing the secure communication accessors. The anomaly can be detected in the IOT
applications during the running of the devices at remote location. The confidentiality of the
information can be kept secured to identify the entrance of the vulnerabilities. The message
authenticity protocols are used for optimizing the security to the communication managed
between them (Chawngsangpuii, Das, Das, 2017).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Chapter 6: Result and Findings
The efficiency and effectiveness of the IOT architecture can be improved by managing the
security control policies on the transport layer and session layer because the data leakages
and the entrance of the vulnerabilities takes place in the communication session organized
between the client and server. The authentication and authorization process should be
deployed by developing the session keys to minimize the interception of the data and
information by the unauthorised parties. The efficiency of the IOT environment can be
improved by the proposed solution with the help of session keys and authorisation process.
The granting of authorization and access control helps in carrying out the secured
transmission of information between the working parties. The automation and intelligence in
the physical devices brings the industrial revolution which is called as industry 4.0. The
cyber-physical system (CPS) can be developed with the integration between the smart
devices which relatively helps in developing the smart factory. The table below shows the
benefit of using proposed solution for preserving the accuracy and confidentiality of the
information in IOT environment.
Requirements Access control and
authorization
Proposed Solution
Providing authorized
communication between the
IOT devices
Authorization and
authentication for accessing
the information
The session keys are
developed for the unique ID
number of IOT devices for
providing validity period to
transfer information and data
securely among the devices
Automation in the transfer of
information
Authentication Registration of entities for
access control should be
done for managing the
session between the server
and clients
Connectivity between the
IOT devices
Access control The cache session keys are
used for developing the
connectivity between the IOT
devices
Instant registration of IOT Access Control The dynamic registration of
The efficiency and effectiveness of the IOT architecture can be improved by managing the
security control policies on the transport layer and session layer because the data leakages
and the entrance of the vulnerabilities takes place in the communication session organized
between the client and server. The authentication and authorization process should be
deployed by developing the session keys to minimize the interception of the data and
information by the unauthorised parties. The efficiency of the IOT environment can be
improved by the proposed solution with the help of session keys and authorisation process.
The granting of authorization and access control helps in carrying out the secured
transmission of information between the working parties. The automation and intelligence in
the physical devices brings the industrial revolution which is called as industry 4.0. The
cyber-physical system (CPS) can be developed with the integration between the smart
devices which relatively helps in developing the smart factory. The table below shows the
benefit of using proposed solution for preserving the accuracy and confidentiality of the
information in IOT environment.
Requirements Access control and
authorization
Proposed Solution
Providing authorized
communication between the
IOT devices
Authorization and
authentication for accessing
the information
The session keys are
developed for the unique ID
number of IOT devices for
providing validity period to
transfer information and data
securely among the devices
Automation in the transfer of
information
Authentication Registration of entities for
access control should be
done for managing the
session between the server
and clients
Connectivity between the
IOT devices
Access control The cache session keys are
used for developing the
connectivity between the IOT
devices
Instant registration of IOT Access Control The dynamic registration of
devices the IOT devices can be done
for managing the
communication and flow of
information between the IOT
devices without any human
intervention
Managing scalability Access control The dynamic registration
process helps in managing
scalability of the IOT
devices. One to many instant
communication can be done
by developing the validity
period between them through
the association of the session
keys.
Resource Management
program
Authentication Crypto keys are used for
managing the resources
between the IOT devices so
that the data leakages and
malware activities can be
avoided. The information is
sent between the devices in
an encrypted format.
Information security,
accuracy, and privacy
Access control The unique ID number is
provided to the entities. The
communication between the
devices takes place through
this unique ID number which
results in the secured
transmission of information
with accuracy and privacy.
Robustness Access control The denial of service attacks
can be minimised by
managing the one to one
for managing the
communication and flow of
information between the IOT
devices without any human
intervention
Managing scalability Access control The dynamic registration
process helps in managing
scalability of the IOT
devices. One to many instant
communication can be done
by developing the validity
period between them through
the association of the session
keys.
Resource Management
program
Authentication Crypto keys are used for
managing the resources
between the IOT devices so
that the data leakages and
malware activities can be
avoided. The information is
sent between the devices in
an encrypted format.
Information security,
accuracy, and privacy
Access control The unique ID number is
provided to the entities. The
communication between the
devices takes place through
this unique ID number which
results in the secured
transmission of information
with accuracy and privacy.
Robustness Access control The denial of service attacks
can be minimised by
managing the one to one
communication through the
unique identifiers
The graph below shows the estimated energy consumed by the server to manage transport
later security in making connection with the clients.
The graph above shows that the verification and validation of the client takes place to
minimize the entrance of vulnerabilities. It helps in managing secure connection between the
sender and receiver. The session keys are provided for managing the validity period to
perform communication between the devices.
The denial of service attack can be minimised by developing the registered entity table. The
trusted authentication can be developed by organizing the communication link and policies.
The backup operation can be performed by managing the trusted authorization between the
devices. The migration of devices can be performed by managing the request and response
between the IOT devices.
unique identifiers
The graph below shows the estimated energy consumed by the server to manage transport
later security in making connection with the clients.
The graph above shows that the verification and validation of the client takes place to
minimize the entrance of vulnerabilities. It helps in managing secure connection between the
sender and receiver. The session keys are provided for managing the validity period to
perform communication between the devices.
The denial of service attack can be minimised by developing the registered entity table. The
trusted authentication can be developed by organizing the communication link and policies.
The backup operation can be performed by managing the trusted authorization between the
devices. The migration of devices can be performed by managing the request and response
between the IOT devices.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
The constrained application protocol is used for developing the public and private keys to
ensure secured transmission of information between the working parties. The certification of
authority should be awarded to ensure the validity period between the sensor devices so that
the secure communication can be effectively managed. The process of authentication and
authorization helps in managing the validity period from granting the ticket of secured
communication. The scalability of the IOT devices can be enhanced by managing one to
many communication links through the development of the session keys. The open source
connectivity can be done easily to manage trusted communication. The performance of the
transport layer security can be enhanced by organizing the session for transferring cipher text
to the destination within the period of validity. The congestion of the IOT devices can be
controlled by addressing the port number. It helps in increasing the reliability and accuracy of
the information. The denial of service attacks and man in the middle attack can be minimized
effectively. The transport layer security attacks such as sync attack, UDP port scanning
attack, sequence number attack, and others can be minimized by packet filtering process
through the validity period of session keys. The routing of the packets can be done for
securing the information transfer over the IOT environment. The minimizing of
authentication and authorization gaps between the entities by providing and managing
database table for unique ID helps in restoring the accuracy of the information by sending
relevant data packets to the desired destination. The implementation of the handshaking
protocol helps in providing acknowledgement of receiving secured data packets from the
ensure secured transmission of information between the working parties. The certification of
authority should be awarded to ensure the validity period between the sensor devices so that
the secure communication can be effectively managed. The process of authentication and
authorization helps in managing the validity period from granting the ticket of secured
communication. The scalability of the IOT devices can be enhanced by managing one to
many communication links through the development of the session keys. The open source
connectivity can be done easily to manage trusted communication. The performance of the
transport layer security can be enhanced by organizing the session for transferring cipher text
to the destination within the period of validity. The congestion of the IOT devices can be
controlled by addressing the port number. It helps in increasing the reliability and accuracy of
the information. The denial of service attacks and man in the middle attack can be minimized
effectively. The transport layer security attacks such as sync attack, UDP port scanning
attack, sequence number attack, and others can be minimized by packet filtering process
through the validity period of session keys. The routing of the packets can be done for
securing the information transfer over the IOT environment. The minimizing of
authentication and authorization gaps between the entities by providing and managing
database table for unique ID helps in restoring the accuracy of the information by sending
relevant data packets to the desired destination. The implementation of the handshaking
protocol helps in providing acknowledgement of receiving secured data packets from the
sender. It minimizes the impact of POODLE and man in the middle attack. The finishing time
of sending the packets between the entities can be minimized and complete the sending
process within the given time. The acknowledgement of datagram helps in guarantee the
secured transmission of data packets. The general requirement of security can be fulfilled by
ensuring the privacy of data packets, authentication and authorization to the sender for
sending the information to the client, ensuring confidentiality of the information, and
managing integrity of the information. The encryption and decryption of the data packets are
done through the symmetric cryptographic algorithm to preserve the accuracy and sensitivity
of the information. The security framework is developed for organizing the specification of
security control parameters. The message is transmitted in breaking the information into
frame which is provided with the frame counter. The key value is sent with the frame for
decrypting the information by the client.
of sending the packets between the entities can be minimized and complete the sending
process within the given time. The acknowledgement of datagram helps in guarantee the
secured transmission of data packets. The general requirement of security can be fulfilled by
ensuring the privacy of data packets, authentication and authorization to the sender for
sending the information to the client, ensuring confidentiality of the information, and
managing integrity of the information. The encryption and decryption of the data packets are
done through the symmetric cryptographic algorithm to preserve the accuracy and sensitivity
of the information. The security framework is developed for organizing the specification of
security control parameters. The message is transmitted in breaking the information into
frame which is provided with the frame counter. The key value is sent with the frame for
decrypting the information by the client.
Chapter 7: Research Limitation, Future Scope and Conclusion
The limitation of this project is that the trust and confidence of the user cannot be controlled
for developing the secured IOT environment. The verification and validation technique can
missed the updated vulnerabilities which can affect the security architecture of the IOT. The
research is limited to the literature review and qualitative analysis of information to develop a
secured model for transport layer security system. The detection of vulnerabilities depends on
the programming code used by the hackers to destroy the authenticity of the information. The
repetition of same protocols for authenticity can be analysed by the hackers and more
vulnerable software can be added for exploiting the accuracy of the sensor devices to result
into abnormal activity of the IOT system.
It can be concluded that the efficiency of the Transport layer security can be measured with
respect to the negative impact seen on the IOT working environment. The internet of service
helps in developing the smart factory by managing the effective operation between the
devices such as Supply chain management system, Enterprise resource planning system, and
others. The POODLE attack results in disturbing the managing the interoperations and
compatibility. The block padding results in defining the handshaking protocol. The man-in-
the middle attack occurred in defining the vulnerability in sending the connection between
the sender and destination. The downgrading of the information results in the vulnerabilities
on the secure socket layer. The dependence of the network devices is managed through the
local central system and global central system. The performance of the transport layer
security can be enhanced by organizing the session for transferring cipher text to the
destination within the period of validity. The congestion of the IOT devices can be controlled
by addressing the port number. It helps in increasing the reliability and accuracy of the
information. The accessing of the information can be done through the use of authentication
protocol. The cryptographic keys and session keys should be developed for organizing the
validity and verification of the activity sources. The registration of the sensor devices should
be done on the IOT domain. The operational efficiency and security of the system can be
improved by managing the authorized communication between entities. The cryptographic
keys should be generated by developing the unique identifiers between the entities. The
credentials of the session keys are used for managing the flow of information in the personal
area network. The Transport control protocol (TCP) and user datagram protocol (UDP) are
used for securing the transmission process of data packets. The configuration of the devices
should be registered for securing the flow of information to the destination. The network
The limitation of this project is that the trust and confidence of the user cannot be controlled
for developing the secured IOT environment. The verification and validation technique can
missed the updated vulnerabilities which can affect the security architecture of the IOT. The
research is limited to the literature review and qualitative analysis of information to develop a
secured model for transport layer security system. The detection of vulnerabilities depends on
the programming code used by the hackers to destroy the authenticity of the information. The
repetition of same protocols for authenticity can be analysed by the hackers and more
vulnerable software can be added for exploiting the accuracy of the sensor devices to result
into abnormal activity of the IOT system.
It can be concluded that the efficiency of the Transport layer security can be measured with
respect to the negative impact seen on the IOT working environment. The internet of service
helps in developing the smart factory by managing the effective operation between the
devices such as Supply chain management system, Enterprise resource planning system, and
others. The POODLE attack results in disturbing the managing the interoperations and
compatibility. The block padding results in defining the handshaking protocol. The man-in-
the middle attack occurred in defining the vulnerability in sending the connection between
the sender and destination. The downgrading of the information results in the vulnerabilities
on the secure socket layer. The dependence of the network devices is managed through the
local central system and global central system. The performance of the transport layer
security can be enhanced by organizing the session for transferring cipher text to the
destination within the period of validity. The congestion of the IOT devices can be controlled
by addressing the port number. It helps in increasing the reliability and accuracy of the
information. The accessing of the information can be done through the use of authentication
protocol. The cryptographic keys and session keys should be developed for organizing the
validity and verification of the activity sources. The registration of the sensor devices should
be done on the IOT domain. The operational efficiency and security of the system can be
improved by managing the authorized communication between entities. The cryptographic
keys should be generated by developing the unique identifiers between the entities. The
credentials of the session keys are used for managing the flow of information in the personal
area network. The Transport control protocol (TCP) and user datagram protocol (UDP) are
used for securing the transmission process of data packets. The configuration of the devices
should be registered for securing the flow of information to the destination. The network
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
architecture of the industry 4.0 is based on authorization control policies between the
different platforms of the IOT environment. The authentication and authorization process
should be deployed by developing the session keys to minimize the interception of the data
and information by the unauthorised parties. The efficiency of the IOT environment can be
improved by the proposed solution with the help of session keys and authorisation process.
The granting of authorization and access control helps in carrying out the secured
transmission of information between the working parties.
different platforms of the IOT environment. The authentication and authorization process
should be deployed by developing the session keys to minimize the interception of the data
and information by the unauthorised parties. The efficiency of the IOT environment can be
improved by the proposed solution with the help of session keys and authorisation process.
The granting of authorization and access control helps in carrying out the secured
transmission of information between the working parties.
References:
Alfaqih, T., and Muhtadi, J. (2016). Internet of things security based on devices architecture.
1st ebook [Online]. Available at:
https://www.researchgate.net/publication/326160395_Internet_of_Things_Security_based_on
_Devices_Architecture [Accessed on 18 Mar, 2019]
Aneela, G., Anusha, I., Malavika, K., and Saripalle,R. (2017). Research trends of network
security in IOT. International journal of innovative studies in sciences and engineering
technology, 3(9). Available at:
https://pdfs.semanticscholar.org/c5cf/b8482b9644502f55256e9adbd708001179b1.pdf
[Accessed on 18 Mar, 2019]
Chawngsangpuii, R., Das, P., Das, R. (2017). Security management perspectives for internet
of things. International journal of engineering science invention, 6(9), pp. 2319-6734.
Available at: http://www.ijesi.org/papers/Vol(6)9/Version-2/H0609025965.pdf [Accessed on
18 Mar, 2019]
Corser, G. (2017). Internet of things security: Best practices. 1st ebook [Online]. Available
at: https://internetinitiative.ieee.org/images/files/resources/white_papers/
internet_of_things_may_2017.pdf [Accessed on 18 Mar, 2019]
Gomez, C., Moret, A., Crowcroft, J. (2015). TCP in the internet of things: From ostracism to
prominence. IEEE internet computing, pp.99:1-1. Available at:
https://www.researchgate.net/publication/322549192_TCP_in_the_Internet_of_Things_From
_Ostracism_to_Prominence [Accessed on 18 Mar, 2019]
Gondi, V., White, D., Gemmill, J., and Post, C. (2016). Security vulnerabilities and
challenges in IOT end to end systems and current security implementation. 1st ebook
[Online]. Available at:
https://www.researchgate.net/publication/301200106_Security_Vulnerabilities_and_Challeng
es_in_IoT_End_to_End_Systems_and_Current_Security_Implementations [Accessed on 18
Mar, 2019]
Hezam, A., Konstantas, D., Mahyoub, M. (2018). A Comprehensive IOT attacks surveys
based on building blocked reference mode. International journal of advanced computer
science and applications, 9(3). Available at:
Alfaqih, T., and Muhtadi, J. (2016). Internet of things security based on devices architecture.
1st ebook [Online]. Available at:
https://www.researchgate.net/publication/326160395_Internet_of_Things_Security_based_on
_Devices_Architecture [Accessed on 18 Mar, 2019]
Aneela, G., Anusha, I., Malavika, K., and Saripalle,R. (2017). Research trends of network
security in IOT. International journal of innovative studies in sciences and engineering
technology, 3(9). Available at:
https://pdfs.semanticscholar.org/c5cf/b8482b9644502f55256e9adbd708001179b1.pdf
[Accessed on 18 Mar, 2019]
Chawngsangpuii, R., Das, P., Das, R. (2017). Security management perspectives for internet
of things. International journal of engineering science invention, 6(9), pp. 2319-6734.
Available at: http://www.ijesi.org/papers/Vol(6)9/Version-2/H0609025965.pdf [Accessed on
18 Mar, 2019]
Corser, G. (2017). Internet of things security: Best practices. 1st ebook [Online]. Available
at: https://internetinitiative.ieee.org/images/files/resources/white_papers/
internet_of_things_may_2017.pdf [Accessed on 18 Mar, 2019]
Gomez, C., Moret, A., Crowcroft, J. (2015). TCP in the internet of things: From ostracism to
prominence. IEEE internet computing, pp.99:1-1. Available at:
https://www.researchgate.net/publication/322549192_TCP_in_the_Internet_of_Things_From
_Ostracism_to_Prominence [Accessed on 18 Mar, 2019]
Gondi, V., White, D., Gemmill, J., and Post, C. (2016). Security vulnerabilities and
challenges in IOT end to end systems and current security implementation. 1st ebook
[Online]. Available at:
https://www.researchgate.net/publication/301200106_Security_Vulnerabilities_and_Challeng
es_in_IoT_End_to_End_Systems_and_Current_Security_Implementations [Accessed on 18
Mar, 2019]
Hezam, A., Konstantas, D., Mahyoub, M. (2018). A Comprehensive IOT attacks surveys
based on building blocked reference mode. International journal of advanced computer
science and applications, 9(3). Available at:
https://www.researchgate.net/publication/324149744_A_Comprehensive_IoT_Attacks_Surve
y_based_on_a_Building-blocked_Reference_Mode [Accessed on 18 Mar, 2019]
Iqbal, M., Olaleye, O., and Bayoumi, M. (2016). A review on internet of things: Security and
privacy requirement and the solution approaches. Global journal of computer science and
technology: E-network, web and security . Available at:
https://globaljournals.org/GJCST_Volume16/1-A-Review-on-Internet-of-Things.pdf
[Accessed on 18 Mar, 2019]
Kamel, S., and Hegazi, N. (2015). A proposed model of IOT security management system
based on a study of internet of things security. International journal of scientific and
engineering research, 9(9), pp. 1227-1244. Available at:
https://www.researchgate.net/publication/328163339_A_Proposed_Model_of_IoT_Security_
Management_System_Based_on_A_study_of_Internet_of_Things_IoT_Security [Accessed
on 18 Mar, 2019]
Kamel, S., and Hegazi, N. (2018). A proposed model of IOT security management system
based on a study of IOT security. International journal of scientific and engineering
research, 9(9), pp. 1227-1244. Available at:
https://www.researchgate.net/publication/328163339_A_Proposed_Model_of_IoT_Security_
Management_System_Based_on_A_study_of_Internet_of_Things_IoT_Security [Accessed
on 18 Mar, 2019]
Khalid, A. (2016). Internet of things architecture and research agenda. International journal
of computer science and mobile computing, 5(3), pp. 351-356. Available at:
https://ijcsmc.com/docs/papers/March2016/V5I3201699a15.pdf [Accessed on 18 Mar, 2019]
Kim, H. (2016). Securing the internet of things via locally centralised globally distributed
authentication and authorization. 1st ebook [Online]. Available at:
https://www2.eecs.berkeley.edu/Pubs/TechRpts/2017/EECS-2017-139.pdf [Accessed on 18
Mar, 2019]
Kim, H. (2017). Securing the internet of things via locally centralized globally distributed
authentication and authorization. 1st ebook [Online]. Available at:
https://www2.eecs.berkeley.edu/Pubs/TechRpts/2017/EECS-2017-139.pdf [Accessed on 18
Mar, 2019]
y_based_on_a_Building-blocked_Reference_Mode [Accessed on 18 Mar, 2019]
Iqbal, M., Olaleye, O., and Bayoumi, M. (2016). A review on internet of things: Security and
privacy requirement and the solution approaches. Global journal of computer science and
technology: E-network, web and security . Available at:
https://globaljournals.org/GJCST_Volume16/1-A-Review-on-Internet-of-Things.pdf
[Accessed on 18 Mar, 2019]
Kamel, S., and Hegazi, N. (2015). A proposed model of IOT security management system
based on a study of internet of things security. International journal of scientific and
engineering research, 9(9), pp. 1227-1244. Available at:
https://www.researchgate.net/publication/328163339_A_Proposed_Model_of_IoT_Security_
Management_System_Based_on_A_study_of_Internet_of_Things_IoT_Security [Accessed
on 18 Mar, 2019]
Kamel, S., and Hegazi, N. (2018). A proposed model of IOT security management system
based on a study of IOT security. International journal of scientific and engineering
research, 9(9), pp. 1227-1244. Available at:
https://www.researchgate.net/publication/328163339_A_Proposed_Model_of_IoT_Security_
Management_System_Based_on_A_study_of_Internet_of_Things_IoT_Security [Accessed
on 18 Mar, 2019]
Khalid, A. (2016). Internet of things architecture and research agenda. International journal
of computer science and mobile computing, 5(3), pp. 351-356. Available at:
https://ijcsmc.com/docs/papers/March2016/V5I3201699a15.pdf [Accessed on 18 Mar, 2019]
Kim, H. (2016). Securing the internet of things via locally centralised globally distributed
authentication and authorization. 1st ebook [Online]. Available at:
https://www2.eecs.berkeley.edu/Pubs/TechRpts/2017/EECS-2017-139.pdf [Accessed on 18
Mar, 2019]
Kim, H. (2017). Securing the internet of things via locally centralized globally distributed
authentication and authorization. 1st ebook [Online]. Available at:
https://www2.eecs.berkeley.edu/Pubs/TechRpts/2017/EECS-2017-139.pdf [Accessed on 18
Mar, 2019]
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Kothmayr, T., Hu, W., Schmitt, C., Bruenig, M. (2011). Securing the internet of things with
DTLS. International conference on embedded network sensor systems. Available at:
https://pdfs.semanticscholar.org/c5cf/b8482b9644502f55256e9adbd708001179b1.pdf
[Accessed on 18 Mar, 2019]
Lopez, D., Uribe, M., Cely, C., Torres, A., Castro, S., and Marmol, G. (2018). Sheilding IOT
against cyber attacks: An event based approach using SIEM. International journal of wireless
communication and mobile computing. Available at:
https://www.hindawi.com/journals/wcmc/2018/3029638/ [Accessed on 18 Mar, 2019]
Marksteiner, S., Jimenez, V., Vallant, H., Zeiner, H. (2015). An Overview of Wireless IOT
protocol security in smart home domain. 1st ebook [Online]. Available at:
https://arxiv.org/pdf/1801.07090.pdf [Accessed on 18 Mar, 2019]
Mendez, D., Papapanagiotou, I., Yang, B. (2015). Internet of things: Survey on security and
privacy. International journal on IOT security. Available at:
https://arxiv.org/pdf/1707.01879.pdf [Accessed on 18 Mar, 2019]
Panarllo, A., Tapas, N., Merlino, G., Longo, F., and Puliafito, A. (2018). Blockchain and IOT
integration: A Systematic survey. 1st ebook [Online]. Available at:
https://www.researchgate.net/publication/304407957_A_DTLS-
based_security_architecture_for_the_Internet_of_Things [Accessed on 18 Mar, 2019]
Ray, P. (2016). A survey on Internet of things architectures. 1st ebook [Online]. Available at:
https://www.sciencedirect.com/science/article/pii/S1319157816300799 [Accessed on 18 Mar,
2019]
Salah, K, and Khan, M. (2017). IOT security: Review, Blockchain solutions, and open
challenges. International journal of future generation computer system. Available at:
https://www.researchgate.net/publication/321017113_IoT_Security_Review_Blockchain_Sol
utions_and_Open_Challenges [Accessed on 18 Mar, 2019]
Santos, G., Guimaraes, V., Rodrigues, G., Granville, L. (2015). A DTLS based security
architecture for the internet of things. 1st ebook [Online]. Available at:
https://www.researchgate.net/publication/304407957_A_DTLS-
based_security_architecture_for_the_Internet_of_Things [Accessed on 18 Mar, 2019]
DTLS. International conference on embedded network sensor systems. Available at:
https://pdfs.semanticscholar.org/c5cf/b8482b9644502f55256e9adbd708001179b1.pdf
[Accessed on 18 Mar, 2019]
Lopez, D., Uribe, M., Cely, C., Torres, A., Castro, S., and Marmol, G. (2018). Sheilding IOT
against cyber attacks: An event based approach using SIEM. International journal of wireless
communication and mobile computing. Available at:
https://www.hindawi.com/journals/wcmc/2018/3029638/ [Accessed on 18 Mar, 2019]
Marksteiner, S., Jimenez, V., Vallant, H., Zeiner, H. (2015). An Overview of Wireless IOT
protocol security in smart home domain. 1st ebook [Online]. Available at:
https://arxiv.org/pdf/1801.07090.pdf [Accessed on 18 Mar, 2019]
Mendez, D., Papapanagiotou, I., Yang, B. (2015). Internet of things: Survey on security and
privacy. International journal on IOT security. Available at:
https://arxiv.org/pdf/1707.01879.pdf [Accessed on 18 Mar, 2019]
Panarllo, A., Tapas, N., Merlino, G., Longo, F., and Puliafito, A. (2018). Blockchain and IOT
integration: A Systematic survey. 1st ebook [Online]. Available at:
https://www.researchgate.net/publication/304407957_A_DTLS-
based_security_architecture_for_the_Internet_of_Things [Accessed on 18 Mar, 2019]
Ray, P. (2016). A survey on Internet of things architectures. 1st ebook [Online]. Available at:
https://www.sciencedirect.com/science/article/pii/S1319157816300799 [Accessed on 18 Mar,
2019]
Salah, K, and Khan, M. (2017). IOT security: Review, Blockchain solutions, and open
challenges. International journal of future generation computer system. Available at:
https://www.researchgate.net/publication/321017113_IoT_Security_Review_Blockchain_Sol
utions_and_Open_Challenges [Accessed on 18 Mar, 2019]
Santos, G., Guimaraes, V., Rodrigues, G., Granville, L. (2015). A DTLS based security
architecture for the internet of things. 1st ebook [Online]. Available at:
https://www.researchgate.net/publication/304407957_A_DTLS-
based_security_architecture_for_the_Internet_of_Things [Accessed on 18 Mar, 2019]
Sfar, A., Natalizio, E., Challal, Y., and Chtourou, Z. (2015). A roadmap for security
challenges in the internet of things. 1st ebook [Online]. Available at:
https://www.sciencedirect.com/science/article/pii/S2352864817300214 [Accessed on 18 Mar,
2019]
Shang, W., Yu, Y., and Droms, R. (2016). Challenges in IOT networking via TCP/IP
architecture. 1st ebook [Online]. Available at:
https://named-data.net/wp-content/uploads/2016/02/ndn-0038-1-challenges-iot.pdf [Accessed
on 18 Mar, 2019]
Shifa, A. (2015). Multimedia security perspectives in IOT. 1st ebook [Online]. Available at:
http://www.dline.info/jisr/fulltext/v7n4/jisrv7n4_3.pdf [Accessed on 18 Mar, 2019]
Siddiqui, T., and Allazzawi, S. (2018). Security of internet of things. International journal of
applied science-Research and review, 5(28). Available at:
http://www.imedpub.com/articles/security-of-internet-of-things.pdf [Accessed on 18 Mar,
2019]
Siddiqui, T., and Badr, S. (2018). Security of internet of things. International journal of
applied science- Research and Review. Available at:
http://www.imedpub.com/articles/security-of-internet-of-things.pdf [Accessed on 18 Mar,
2019]
Zhang, H. (2016). A peer to peer security protocol for the internet of things. 1st ebook
[Online]. Available at:
https://www.diva-portal.org/smash/get/diva2:754990/FULLTEXT01.pdf [Accessed on 18
Mar, 2019]
challenges in the internet of things. 1st ebook [Online]. Available at:
https://www.sciencedirect.com/science/article/pii/S2352864817300214 [Accessed on 18 Mar,
2019]
Shang, W., Yu, Y., and Droms, R. (2016). Challenges in IOT networking via TCP/IP
architecture. 1st ebook [Online]. Available at:
https://named-data.net/wp-content/uploads/2016/02/ndn-0038-1-challenges-iot.pdf [Accessed
on 18 Mar, 2019]
Shifa, A. (2015). Multimedia security perspectives in IOT. 1st ebook [Online]. Available at:
http://www.dline.info/jisr/fulltext/v7n4/jisrv7n4_3.pdf [Accessed on 18 Mar, 2019]
Siddiqui, T., and Allazzawi, S. (2018). Security of internet of things. International journal of
applied science-Research and review, 5(28). Available at:
http://www.imedpub.com/articles/security-of-internet-of-things.pdf [Accessed on 18 Mar,
2019]
Siddiqui, T., and Badr, S. (2018). Security of internet of things. International journal of
applied science- Research and Review. Available at:
http://www.imedpub.com/articles/security-of-internet-of-things.pdf [Accessed on 18 Mar,
2019]
Zhang, H. (2016). A peer to peer security protocol for the internet of things. 1st ebook
[Online]. Available at:
https://www.diva-portal.org/smash/get/diva2:754990/FULLTEXT01.pdf [Accessed on 18
Mar, 2019]
1 out of 42
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.