ISSN: 2277-9655 [Waikul* et al., 6(4): April, 2017] Impact Factor: 4.116 IC™ Value: 3.00 CODEN: IJESS7 http: // www.ijesrt.com© International Journal of Engineering Sciences & Research Technology [662] IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY DESIGN AND DEVELOPMENT OF SECURITY FRAMEWORK BY USING APPLICATION LAYER PROTOCOL Asawari Waikul, Snehal Belgaonkar, Karishma Tyagi, Prerna Sharan Department of Information Technology, BVCOEW, Pune, India G. V. Ramana Rao Central Water and Power Research Station, Pune, India DOI: 10.5281/zenodo.557204 ABSTRACT Internet of Things (IoT), a revolution in the ordinary life of people, transforming the global IT landscape, the development strategy of different types of businesses in various sectors and much more. Due to the various flaws like limited energy, low processing power, lossy wireless links, constrained storage of the IoT devices; it’s the need of the hour that security should be the trivial enabler of IoT. Till date, no silver bullet exists that can effectively implement security in IoT on devices. The closed source security solutions do not help to inculcate security in IoT so that they can communicate securely. The proposed system aims at the implementation of security for authentication and communication of the constrained as well as non-constrained devices in a network. The communication between the devices is established through a proxy server. Depending on various factors like timestamp, the developed application using .net framework detects and blocks the access to the attacker. KEYWORDS: IoT, Proxy Server, SQL Injection INTRODUCTION The IoT is a technological revolution that expands the already common concepts of ‘anytime’ and ‘anyplace’ to the connectivity for “anything”. It is the network of physical objects that contain embedded technology to communicate with the external environment. It encompasses hardware (the ‘things’), embedded software, connectivity services, and information services associated with the things. It includes low power, low memory footprints (RAM/ROM), low processing power devices. They should have provision of IPv6 with 6LoWPAN Adaptation Layer. The transition from a closed network to the public Internet is growing rapidly and the raising alarms about security. As we are getting dependent on the independent, interconnected and smart devices day by day, how do we protect potentially a huge number of them from attacks, intrusions and interference that could compromise the personal privacy or may threaten the public safety? A large number of security issues with the IoT devices are present till date like Ubiquitous data collection, potential for unexpected uses of consumer data, increased automation and digitization that can pose safety risks, potential of privacy breaches, large amount of data will be generated, both for big data and personal data. WAN links are optimized for human interface applications; IoT is expected to automatically transmit the data. The proliferation of the IoT offers opportunities, but may also bear risks. A neglected aspect of the IoT is the possible increase in power consumption. IoT devices are usually expected to be reachable by other devices at all times. It means the devices consume electrical energy even when the device is not in use for its primary function. Our proposed system has a network of a certain number of nodes (IoT devices) communicating with each other within the same network. The client requests the proxy server and gets serviced if it is genuine. The attacker node tries to extract the password from the database using various patterns of the password. The proposed system is designed in such a way that if any user tries to login within a specified time limit incorrectly, an alarm will be generated and that particular IP address will be blocked. Also there are cases when the genuine user cannot get access to the services due to technical faults and they also gets blocked. So, the Administrator also