A Literature Survey on IoT Security Challenges
@article{Dihulia2017ALS, title={A Literature Survey on IoT Security Challenges}, author={Shubhalika Dihulia and Tanveer Farooqui}, journal={International Journal of Computer Applications}, year={2017}, volume={169}, pages={10-14} }
This survey paper discuss the security challenges in IoT network. IoT is hot research topic in between researchers. In the era of digital media IoT play an important role of information servers and data warehouses. IoT network are used in different cities of smart city network. That’s why the security of the IoT network is also a big task. There are many loop holes available in IoT based security network. In this survey paper discuss the security aspects in the IoT networks. Also discuss the…
3 Citations
A Review of IoT Security Challenges and Solutions
- Computer Science2020 8th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)
- 2020
This paper provides an overview of IoT architectural layers and components, security issues and challenges at different layers, some solutions, and future directions.
A comparative study on Internet of Things (IoT): Frameworks, Tools, Applications and Future directions
- Computer ScienceJournal of Intelligent Systems and Internet of Things
- 2020
This paper attempts to provide a comprehensive survey of the available literature related to IoT technologies and its applications in many areas of modern-day living.
Internet of Things : Recap
- Computer ScienceInternational Journal of Scientific Research in Science, Engineering and Technology
- 2019
The future of Internet of Things can provide a broader vision, enable everyone to access locations,Things and contribute rich information about the surroundings, things and locations and the social network’s success of sharing experience and personalised insights shows great potential for integration with business-centric applications.
References
SHOWING 1-10 OF 33 REFERENCES
A survey of security issues in wireless sensor networks
- Computer ScienceIEEE Communications Surveys & Tutorials
- 2006
This article outlines the constraints, security requirements, and attacks with their corresponding countermeasures in WSNs, and presents a holistic view of security issues, classified into five categories: cryptography, key management, secure routing, secure data aggregation, and intrusion detection.
RFID security in the context of "internet of things"
- Computer ScienceSecurIT '12
- 2012
A recently proposed protocol's strengths and weaknesses are discussed and then an improved protocol is proposed, retaining efficiency of the protocol intact, for solving identification issues of objects around us in a cost effective manner.
Research and Application on the Smart Home Based on Component Technologies and Internet of Things
- Computer Science
- 2011
Spamming the Internet of Things: A Possibility and its probable Solution
- Computer ScienceANT/MobiWIS
- 2012
Integrating RFIDs and Smart Objects into a Unified Internet of Things Architecture
- Computer ScienceAdv. Internet Things
- 2011
A generic Internet of Things architecture trying to resolve the existing restrictions of current architectural models by integrating both RFID and smart object-based infrastructures, while also exploring a third parameter, i.e. the social potentialities of the Internet of Thing building blocks towards shaping the “Social Internet of things”.
Internet of Things: Services and Applications Categorization
- Computer ScienceAdv. Internet Things
- 2011
The four main categories of services provided by the Internet of Things are introduced and a number of examples of each of the service categories are provided so as to provide an example of how each type of service might be implemented, and how it can be used to build an IoT application.
Handoff in hybrid mobile data networks
- Business, Computer ScienceIEEE Wirel. Commun.
- 2000
An overview of issues related to handoff with particular emphasis on hybrid mobile data networks is presented and five architectures for the example hybrid network, based on emulation of GPRS entities within the WLAN, mobile IP, a virtual access point, and a mobility gateway, are described and compared.
Transparency and Development: Ethical Consumption through Web 2.0 and the Internet of Things
- Art
- 2011
Commentators are now pointing to the potential for a globalization of knowledge and transparency that will harness the power of the Internet to allow consumers to learn more about the commodities…