ABSTRACT

The Internet of Things is one of the promising technologies and has received a lot of attention recently in both the academic and the industrial worlds. The goal is to seamlessly combine the physical and digital worlds into a unified ecosystem to create a new intelligent Internet age. This technology has significant economic value for businesses and opens doors for several current uses in energy, healthcare and other industries. However, because of its emerging nature and resource-constrained IoT devices, the IoT faces a number of security challenges that are more difficult to address than those in other industries. Many studies have been started to offer adequate security solutions for IoT, primarily to address resource limitations and scalability difficulties. This chapter proposes a security model called the Verification of Keys Scheme (VKS) paradigm for included IoT devices. In terms of flexibility and scalability, the pool of authorized nodes is selected using a method that involves sending fictitious packets to nearby devices and asking them for the quickest path that helps to achieve security. The results are discussed and are found to be superior to the existing solutions.