Network Privacy Reflection using Internet of Things

K. Thamizhmaran
2021 Zenodo  
The current IP and other networks such as Power Smart Grids are fast developing, thus ensuing in diverse connectivity methodologies. This has led to the emergence of "the Internet of Things" (IoT) methodology whose goal is to transform the current IP and related networks to Device-to-Device (D-2-D) basis. It will seamlessly interconnect the globe via intelligent devices and sensors of varying types, this resulting in voluminous generation and exchange of data in excess of 20 billion
more » ... nected objects and sensors (things) by 2022. The resultant structure will benefit mankind by helping us make tough decisions as well as be provisioned of beneficial services. In this paper, we overview both IoT enabled network architecture as well as security for associated objects and devices. We commence with a description of a generalized IoT enabled network's security architecture as well as how the various elements constituting them interact. We then describe an approach that allows the protection of both constrained and unconstrained IoT devices through robust encryption as well as authentication so that both can equally leverage from the same security framework, but still maintaining low computational loads, by avoiding excessive computational operations
doi:10.5281/zenodo.4477853 fatcat:d3xvg7utuvgqzcrsssaksnlvtm