Return to search

Secure system simulation - Internet of Things

<p>Internet of Things (IoT) can be defined as a collection of smart devices interacting with each other unanimously to fulfill a common goal. The real world data collected from the Internet of Things can be made as an integral part of web known as Web of Things (WoT). With the help of Web of Things architecture, the users can leverage simple web mechanisms such as browsing, searching and caching to interact with the smart devices. This thesis aims to create an entire system simulating the Web of Things architecture including sensors, edge routers, web interfaces, endpoints to the IoT network and access control. Several technologies such as CoAP, 6LoWPAN, IEEE 802.15.4, contiki and DTLS have been evaluated before inclusion in the implementation. A complete web portal utilizing Californium framework and Role Based Access Control has been created for accessing and interacting with the sensors and their data. This thesis provides an end-to-end approach towards IoT device security by implementing Constrained Application Protocol (CoAP) over Datagram Transport Layer Security (DTLS) in the system. The performance of secured system is analyzed in a constrained environment based on which it is observed that DLTS implementation increases the RAM usage, code size, packet overhead and power consumption by a significant value. Finally, the future work that needs to considered in order to iterate towards better security is specified. </p>

Identiferoai:union.ndltd.org:PROQUEST/oai:pqdtoai.proquest.com:10116148
Date08 July 2016
CreatorsVerma, Yukti
PublisherCalifornia State University, Long Beach
Source SetsProQuest.com
LanguageEnglish
Detected LanguageEnglish
Typethesis

Page generated in 0.0025 seconds