Please use this identifier to cite or link to this item: http://archives.univ-biskra.dz/handle/123456789/14615
Title: The implementation of security and privacy in IoT device
Other Titles: ELECTRONIQUE
Authors: gherbia, amel
Issue Date: 20-Jun-2019
Abstract: Security research in IoT did an evaluation and found that 70% of what we called IoT devices are venerable of attack. So that motivate us to find more information and look for options that can solve the problem. The aim of this project was to secure a Raspberry Pi on three steps, first step we started by protect our network in order to prevent the many networking attacks. Second we Setup a Firewall In order to protect our R-PI against threats originating from the internet, a host based firewall is the solution to control any incoming connections. The idea is to close all the ports by default and only open up the ports we need. There also Setup an Intrusion Detection System (IDS), it looks deeper into packets payloads allowing it to detect malicious traffic. Last part we secure our Communications by Transport Layer Security (TLS) formally Secure Sockets Layer (SSL) session which is used to enable privacy and security for the communications over internet. We note that all the IoT platforms provides more or less similar features. The most important points that we must know it: We use the raspberry pi for apply a security steps and we used a SD carte of 32 GB , because when we use less GB number we needed to start the work again on another SD carte had more memory size. There is a new IoT platform which work always to develop all functions of their platform, so we must keep track of all updates or we will find a problem and take a lot of time to solve it. For IoT device the security part is a thing which we can’t ever forget about it or give it less important from the other parts. There are a lot of software which are open Source IDS Tools that we can replaced with snort in our example here and find the different between them. We can add security of sensors that enable the Internet of Things (IoT) by collecting the data for smarter decisions. And we advise to add more about energy and the force of the small devices in IoT. I wish that the students coming after us can gain time and experience in field like IoT device security and add more steps or study a different sides that effect on security like:IoT device connectivity where devices identify and authenticate each other directly and exchange information without the involvement of a broker. Compatibility and longevity, this will cause difficulties and require the deployment of extra hardware and software when connecting devices. Finally, Making stuffs is cool, making secured stuffs is better
URI: http://archives.univ-biskra.dz/handle/123456789/14615
Appears in Collections:Faculté des Sciences et de la technologie (FST)

Files in This Item:
File Description SizeFormat 
gherbia_amel.pdf5,33 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.