Abstract

The rapid development of the underlying infrastructure of the internet has permitted the widespread acceptance of a number of emerging technologies that have far-reaching ramifications for current society. As a result of the expansion of the Internet of Things, several new networking protocols and upgrades have been created and implemented. On top of that, there is a significant shortage of financing for the development of information technology applications, as well as critical security problems that jeopardise private data. As if that weren’t enough, there are also substantial weaknesses in the data’s privacy protection. In spite of the enormous research that has been done, there has not been a single security solution for the IoT network that has been proved to be entirely effective. This is due to the fact that the network of things connected to the Internet of Things has a unique mix of low energy usage, rare materials, sufficient computational power, and considerable operational expenses. As a consequence of this, we consider the modification of the protocol to be a viable and comprehensive strategy for defending Internet of Things devices from cyberattacks. The inclusion of IoT layer-specific security solutions into enhanced code is one of the many ways in which algorithmic enhancements contribute to the accomplishment of this objective. In this study, we propose improving and integrating the DTLS Procedure with the earwigging mechanism, also then testing the protocol on representative models o

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call