It is well discussed and understood that there is still a need for suitable security for the Internet of Things. It is however still not clear how existing or emerging security paradigms can be effectively applied to a network of constrained nodes in a lossy communications environment. This thesis provides a survey into what routing protocols can be used with network security in mind. What will also be discussed, is an implementation, that in conjunction which a robust routing protocol, can provide security for a network of constrained devices with a certain level of confidence. The implementation and design involves including communications encryption and centralized non-cryptographic methods for securing the network. This thesis basically explores the use of multiple security mechanisms in an Internet of Things environment by using Contiki OS as the platform of choice for simulations and testing.
Identifer | oai:union.ndltd.org:netd.ac.za/oai:union.ndltd.org:uctcs/oai:techreports.cs.uct.ac.za:998 |
Date | 01 January 2014 |
Creators | Ngqakaza, Lutando |
Source Sets | South African National ETD Portal |
Detected Language | English |
Type | Electronic Thesis or Dissertation |
Format | pdf http://pubs.cs.uct.ac.za/archive/00000998/01/thesis-Final-August-25.pdf |
Page generated in 0.0017 seconds