Volume 20 No 12 (2022)
Download PDF
Security Analysis and Improvements of Communication Protocol in the Internet of Things
Vinod Kumar Singh, Hari Om Sharan, C.S. Raghuvanshi
Abstract
Internet of Things has recently emerged as the cutting-edge technology that is heavily influencing
commercial, healthcare, and military applications. Since anything connected to the internet is
susceptible to cyber attacks and a target for hackers, wireless communications are particularly sensitive
to security risks. Multiple Internet of Things problems are posing security risks and preventing End-toEnd encryption during data transmission. The majority of Internet of Things devices now in use don't
have improved setups or security procedures, which makes them vulnerable to hacker attacks. For all
Internet of Things devices, advanced security standards cannot be used. For the Internet of Things
platform, this study proposed a safe authentication system that keeps track of security risks and ensures
the security of Internet of Things devices. An assessment of the suggested procedure is provided,
demonstrating its capacity to address a range of security concerns.
Keywords
Internet of Things, Communication Protocol, Cyber attacks, Encryption, Access Control
Copyright
Copyright © Neuroquantology
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.