Internet of things (IoT): a survey on protocols and security risks

  title={Internet of things (IoT): a survey on protocols and security risks},
  author={Raghunandanan Aswathy and Nandagopal Malarvizhi},
  journal={International journal of engineering and technology},
  • R. AswathyN. Malarvizhi
  • Published 5 February 2018
  • Computer Science
  • International journal of engineering and technology
A dramatic change by the growth of new ubiquitous computing, our globe is moving towards the fully connected paradigm called Internet of Things (IoT). The world is being connected and interlinked with the exponential growth of this pervasive technology. It plays a significant role in many fields such as healthcare, manufacturing industry, agriculture, transportation, smart homes etc and reinforces our everyday life. It acts as an aegis for covering all the factors such as protocols, key… 

Figures and Tables from this paper

Risk Assessment Methodologies for the Internet of Medical Things: A Survey and Comparative Appraisal

A survey of risk assessment and mitigation methodologies for IoMT and provides various IoMT research and implementation gaps along with a road map of fruitful areas for future research could be of significant value to security assessment researchers and policymakers/stakeholders in the health care industry.

Ubiquitous Computing in Precision Agriculture: A Systematic Review

A systematic review on the research works that explore ubiquitous computing in precision agriculture, including which technologies are being currently applied and which gap scan still be researched is presented.



Securing the Internet of Things: A Standardization Perspective

An in-depth review of the communication security solutions for IoT, specifically the standard security protocols to be used in conjunction with the Constrained Application Protocol (CoAP), an application protocol specifically tailored to the needs of adapting to the constraints of IoT devices.

Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks

This paper is an attempt to classify threat types, besides analyze and characterize intruders and attacks facing IoT devices and services, and to comprehensively understand the threats and attacks on IoT infrastructure.

Security analysis of the constrained application protocol in the Internet of Things

The X.805 security standard is used to analyze the security aspects of the proposed Constrained Application Protocol (CoAP) and highlights the main security drawbacks and hence argues of the need for a new integrated security solution.

Internet of Things(IOT) Based Smart Grid

The main part of project is smart grid meter, where one micro switch is fitted in meter to prevent meter tempering and one hidden switching circuit in that, whenever any person try to open the meter switch will get popup and controller send the message to owner and consumer.

A Study of Efficient Power Consumption Wireless Communication Techniques/ Modules for Internet of Things (IoT) Applications

The results of the study demonstrate that the choice of module for each protocol plays a vital role in battery life due to the difference of power consumption for each module/protocol.

That ‘Internet of Things’ Thing

Jun 22, 2009—I could be wrong, but I'm fairly sure the phrase "Internet of Things" started life as the title of a presentation I made at Procter & Gamble (P&G) in 1999. Linking the new idea of RFID

The Constrained Application Protocol (CoAP)

The Constrained Application Protocol is a specialized web transfer protocol for use with constrained nodes and constrained networks, designed for machine- to-machine (M2M) applications such as smart energy and building automation.

A performance comparison of multi-hop wireless ad hoc network routing protocols

The results of a derailed packet-levelsimulationcomparing fourmulti-hopwirelessad hoc networkroutingprotocols, which cover a range of designchoices: DSDV,TORA, DSR and AODV are presented.