Repository logo
Communities & Collections
All of DSpace
  • English
  • العربية
  • বাংলা
  • Català
  • Čeština
  • Deutsch
  • Ελληνικά
  • Español
  • Suomi
  • Français
  • Gàidhlig
  • हिंदी
  • Magyar
  • Italiano
  • Қазақ
  • Latviešu
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Српски
  • Svenska
  • Türkçe
  • Yкраї́нська
  • Tiếng Việt
Log In
New user? Click here to register. Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "ElMoatez Billah Nagoudi"

Filter results by typing the first few letters
Now showing 1 - 1 of 1
  • Results Per Page
  • Sort Options
  • No Thumbnail Available
    Item
    Adaptation of Data and Comminication Security Techniques in the Context of Internet of Things
    (University Of Eloued جامعة الوادي, 2020-02-23) Kebache Romaissa; Laouid Abdelkader; ElMoatez Billah Nagoudi
    The Internet of Things (IoT) is one of the most discussed and tackled topics in the field of computer science research. Some of the researchers are also looking to the future of the world with this technology. Due to significant research and development that has taken place on the Internet of Things, various vulnerabilities have been observed that IoT should be kept as a technology subject. As a result, many attacks against the IoT were invented before its commercial implementation. In this thesis project, we seek to study in-depth the existing security techniques. Indeed, traditional security mechanisms such as firewalls, intrusion detection, and prevention systems are deployed at the Internet level are used to protect the network from external attacks. Such mechanisms must be adapted to secure the Internet of the new generation. Many security techniques have been proposed in the literature, where an in-depth analysis must be initiated to adapt some of them in the context of the IoT. As soon as the objects can include simple sensors, medical devices, cars, planes, and even nuclear reactors and other objects which can pose risks to human life, the solutions proposed must respond in particular to the restrictions and constraints posed by this type of network.

DSpace software copyright © 2002-2025 LYRASIS

  • Privacy policy
  • End User Agreement
  • Send Feedback