Implementing security for internet of things (IoT)
Internet of Things (IoT) is a network of physical devices connected, thus allowing those devices to communicate with one another. It has become a common buzzword in today culture and will become the next technology that shapes the future. [1] As more devices transform into IoT devices, it raises a c...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2017
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/70434 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Summary: | Internet of Things (IoT) is a network of physical devices connected, thus allowing those devices to communicate with one another. It has become a common buzzword in today culture and will become the next technology that shapes the future. [1] As more devices transform into IoT devices, it raises a concern regarding the security and privacy of that information to send by those devices. [2] This report suggests the use of modern day encryption algorithm and implementing it into IoT devices to secure the information.
The main objective of this project is to research on modern world security implementation for communication and implementing it into IoT devices while taking into consideration that most IoT devices have limited CPU, capacity and power. The chosen IoT category for this project will be for Home Automation System.
This project tackles one of the security goals, Confidentially, by making use of modern day encryption algorithms, methods, and its concept to implement a secure Wi-Fi communication between IoT devices. The Raspberry Pi(s), a palm size minicomputer, have been chosen for this project to simulate those IoT devices, with one acting as the control (master) and the other two as the sensors (slave).
This report highlights the current security concern in IoT device, modern world security implementation for communication, the type of encryption methods and algorithms, project methodology, implementation, testing, and result. Lastly, the conclusion and recommendation for future implementation. |
---|