This survey paper discuss the security challenges in IoT network. IoT is hot research topic in between researchers. In the era of digital media IoT play an important role of information servers and data warehouses. IoT network are used in different cities of smart city network. That's why the security of the IoT network is also a big task. There are many loop holes available in IoT based security network. In this survey paper discuss the security aspects in the IoT networks. Also discuss the different researches previous work and previous work in IoT security. This survey analyzes existing protocols and mechanisms to secure communications in the IoT, as well as open research issues. We analyze how existing approaches ensure fundamental security requirements and protect communications on the IoT, together with the open challenges and strategies for future research work in the area. This is, as far as our knowledge goes, the first survey with such goals.
In this paper, present an improved transmission control protocol. For IoT devices. Currently there are different protocols are exist based on user data gram approach. Similarly TCP is also worked alone, In this present work proposed and improved transmission control protocol that is the hybrid concept of TCP and UDP on IPV6 platform. In the ITCP protocol TCP is used for link connection between two devices and UDP is used for the data sending. On the basic on this proposed new protocol that shows good improved result the transmission time, throughput, packet delivery ratio and other parameters as compare to other IoT protocol present in the IoT. For the simulation of proposed ITCP protocol used JAVA platform. Also compare the proposed result with different protocols. KeywordsComputational time, throughput, packet delivery ratio (PDR), packet loss, transmission control protocol (TCP) and User data gram protocol (UDP).
Other than the emerging IT sector, security is still being a major issue for various companies. Various companies are suffering from several types of threats these days like viruses or intrusions, etc. There are various types of techniques have been applied by the companies like for detection of intrusion and also for providing prevention to the system in order to secure the companies against these types of intrusions. The technology of Intrusion-detection can have a lot of problems, such as low performance, low intelligent level, and more false-negative-rate, high-false-alarm-rate, and so on. The purpose of the IDS is to detect attacks. Objective of this analysis is to describe the phases of the development of concepts of the IDS along with its significance for the researchers and the research-centers, military domains, security and also in order to determine the significance of IDS categories, its classifications, and in which area applied the IDS in order to decrease the threats of network.
In Associate in Nursing Ad-hoc network may be a assortment of mobile nodes dynamically forming a short lived network while not the employment of any existing network infrastructure or centralized administer. attributable to restricted communication vary among mobile nodes in ad-hoc network, many network hopes is also required to deliver a packet from one node to a different node within the wireless network. Many users want to save its resources like battery power, processing and capability for only their personal use hence such nodes become misbehaving in nature and not cooperate do selfish activities. The security of MANET is manipulated by malicious node attack. In such type of attach, a malicious node insert a fake route reply claiming to have the shortest and freshest route to the destination. However, when the data packets arrive, the malicious node discards them. To avoid malicious attack, this work gives behavior analysis with PPN (Prime Product Number) scheme for detection and removal of malicious node.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.