Please use this identifier to cite or link to this item:
http://10.1.7.192:80/jspui/handle/123456789/8793
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Patel, Saurabh | - |
dc.date.accessioned | 2019-08-29T10:00:13Z | - |
dc.date.available | 2019-08-29T10:00:13Z | - |
dc.date.issued | 2018-06-01 | - |
dc.identifier.uri | http://10.1.7.192:80/jspui/handle/123456789/8793 | - |
dc.description.abstract | Nowadays the Internet of Things is very much in use in the real world which is the net- work of constrained devices like the sensor. The IoT devices have very limited resources in terms of computational power, memory, energy etc. The IETF (Internet Engineering Task Force) has defined several protocols especially for the resource which have con- strained environment like CoAP, RPL, MQTT etc. at different layers. Authentication and Authorization are essential to handle secure communication in IoT environment. OAuth 2.0 Protocol is an open standard protocol which is used to grant access to the restricted resource via third-party authentication for REST Web architecture. There are some challenges which are faced when we deploy Oauth 2.0 Protocol in IoT environment because of constrained resources used in IoT devices. To analyze these challenges we experimented with various OAuth servers and messaging standards which packs and un- packs messages by serialization and deserialization. Different messaging approaches for authorization and authentication for the constrained environment have been analyzed in the context of latency and energy consumption. | en_US |
dc.publisher | Institute of Technology | en_US |
dc.relation.ispartofseries | 16MCEN14; | - |
dc.subject | Computer 2016 | en_US |
dc.subject | Project Report 2016 | en_US |
dc.subject | Computer Project Report | en_US |
dc.subject | Project Report | en_US |
dc.subject | 16MCEN | en_US |
dc.subject | 16MCEN14 | en_US |
dc.subject | NT | en_US |
dc.subject | NT 2016 | en_US |
dc.subject | CE (NT) | en_US |
dc.title | Authentication and Authorization schemes for Internet of Things | en_US |
dc.type | Dissertation | en_US |
Appears in Collections: | Dissertation, CE (NT) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
16MCEN14.pdf | 16MCEN14 | 1.06 MB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.