Realisation of security for the internet of things

Internet of Things or IoT is the next big leap in the field of Information Technology. What is so special about it is that billions of devices will be able to talk to each other and to the users conveying information that is of interest. These devices would be uniquely addressable and would conta...

Full description

Saved in:
Bibliographic Details
Main Author: Aung Naing Oo
Other Authors: Pramod Kumar Meher
Format: Final Year Project
Language:English
Published: 2016
Subjects:
Online Access:http://hdl.handle.net/10356/69210
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-69210
record_format dspace
spelling sg-ntu-dr.10356-692102023-03-03T20:51:20Z Realisation of security for the internet of things Aung Naing Oo Pramod Kumar Meher School of Computer Engineering DRNTU::Engineering Internet of Things or IoT is the next big leap in the field of Information Technology. What is so special about it is that billions of devices will be able to talk to each other and to the users conveying information that is of interest. These devices would be uniquely addressable and would contain live information on the data that they hold depending on the environment where they are deployed. Some of the devices that we see in the market today are smart watches, door locks, light bulbs and much more. One sure thing is that more and more such devices would emerge by the end of this decade. It will not be just limited to smart homes but we would also be noticing wide usage in the industries from manufacturing to R&D. With so much hype, users are already concerned about security and privacy related issues when it comes to IoT. Standards and Regulations are still yet to be finalized by official bodies on these issues. Meanwhile, researchers are coming up with different suggestions on the best practices to be used when building these devices. One common point of agreement among them is that security must be built from the very initial stage of design. In this paper, we take a look at the kind of security practices that we may exercise when hooking up IoT devices at home. One of the section displays an innovative mash up between two very different fields of Security and Information Retrieval by using a piece of technology from the latter into the former. Further on, it becomes even more interesting when we visualize encrypted live data from sensors on one end of the network to a web page on the other end. It is of utmost importance that any crucial data be strongly encrypted from end to end, which means, any data that leaves from one point must leave in encrypted format and be only decrypted on the receiving end provided that the receiving party has the correct credentials. The report also sheds some light at vulnerabilities of existing practices and introduces the usage of Virtual Private Network technology. Bachelor of Engineering (Computer Science) 2016-11-28T04:39:11Z 2016-11-28T04:39:11Z 2016 Final Year Project (FYP) http://hdl.handle.net/10356/69210 en Nanyang Technological University 42 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering
spellingShingle DRNTU::Engineering
Aung Naing Oo
Realisation of security for the internet of things
description Internet of Things or IoT is the next big leap in the field of Information Technology. What is so special about it is that billions of devices will be able to talk to each other and to the users conveying information that is of interest. These devices would be uniquely addressable and would contain live information on the data that they hold depending on the environment where they are deployed. Some of the devices that we see in the market today are smart watches, door locks, light bulbs and much more. One sure thing is that more and more such devices would emerge by the end of this decade. It will not be just limited to smart homes but we would also be noticing wide usage in the industries from manufacturing to R&D. With so much hype, users are already concerned about security and privacy related issues when it comes to IoT. Standards and Regulations are still yet to be finalized by official bodies on these issues. Meanwhile, researchers are coming up with different suggestions on the best practices to be used when building these devices. One common point of agreement among them is that security must be built from the very initial stage of design. In this paper, we take a look at the kind of security practices that we may exercise when hooking up IoT devices at home. One of the section displays an innovative mash up between two very different fields of Security and Information Retrieval by using a piece of technology from the latter into the former. Further on, it becomes even more interesting when we visualize encrypted live data from sensors on one end of the network to a web page on the other end. It is of utmost importance that any crucial data be strongly encrypted from end to end, which means, any data that leaves from one point must leave in encrypted format and be only decrypted on the receiving end provided that the receiving party has the correct credentials. The report also sheds some light at vulnerabilities of existing practices and introduces the usage of Virtual Private Network technology.
author2 Pramod Kumar Meher
author_facet Pramod Kumar Meher
Aung Naing Oo
format Final Year Project
author Aung Naing Oo
author_sort Aung Naing Oo
title Realisation of security for the internet of things
title_short Realisation of security for the internet of things
title_full Realisation of security for the internet of things
title_fullStr Realisation of security for the internet of things
title_full_unstemmed Realisation of security for the internet of things
title_sort realisation of security for the internet of things
publishDate 2016
url http://hdl.handle.net/10356/69210
_version_ 1759854502143328256