Open Access Open Access  Restricted Access Subscription or Fee Access

A Study of Security Issues in IoT applications.

Md.Yusuf Khan

Abstract


Security within the new Internet of Things has demonstrated clear vulnerabilities and is not close to the security of new computer systems. At the same time as the net of belongings has developed rapidly over the last few years, safety attention has not been spared. The IoT presents a surplus of the latest limitations and demanding situations that require safety in order to focus on a different way than is traditional in the current information structures. While the criteria for use in today ‘s structures, which could be easily enforced in addition to working for full types of notification and storage, there is no such smart solution to be able to operate on each tool inside the internet due to the various limitations between distinctive devices resulting in IoT arrangements. This theory provides an inspiration as to how security needs to be regulated within the Internet of Things, each within the existing and purpose frameworks. Present devices within incredible domain names and with extraordinary technology have been investigated in order to produce a solid, real photograph of the challenging situations and answers that exist within the IoT today. The 3 major limitations in IoT, computation, bandwidth, and strength are specified and used to generate intentional tasks that can be performed. Special, workable prospects for the IoT, in addition to any difficult circumstances in an attempt to include them, are also established. Responses to the experiments would be wary of whatever resources need to be given, so the in-intensity output of potential responses is primarily determined to have assets identified. In order to increase the focus among makers on the critical demands of IoT security, full hints are delivered chronologically since opening up the layout, growth and protection of IoT-focused devices to builders with and without detailed statistical safety information. Probable answers and options are given, in addition to essential questions, in order to create designers, think exactly about the consequences of the alternatives that they create through the whole process.


Full Text:

PDF

References


Schaller Robert R. Moores law: past, present and future. IEEE Spectr. 1997;34(6):52-9. doi: 10.1109/6.591665.

Ilex Content Strategies Ltd. Addressing the security in the Internet of Things; 2017, May 12 [blog]. Available from: http://www.ilexcontent.com/addressing-security-in-the-internet-ofthings-iot/.

Gubbi Jayavardhana, Buyya Rajkumar, Marusic Slaven, Palaniswami Marimuthu. Internet of things (iot): A vision, architectural elements, and future directions. Future Gener Comput Syst. 2013;29(7):1645-60. doi: 10.1016/j.future.2013.01.010, PMID 16451660.

Abowd Gregory D, Dey Anind K, Brown Peter J, Davies Nigel, Smith Mark, Steggles Pete. Towards a better understanding of context and context-awareness. In: International Symposium on Handheld and Ubiquitous Computing, pages 304307. Springer; 1999.

Perera Charith, Zaslavsky Arkady, Christen Peter, Georgakopoulos Dimitrios. Context aware computing for the internet of things: A survey. IEEE Commun Surv Tutorials. 2014;16(1):414-54. doi: 10.1109/SURV.2013.042313.00197, PMID 414454.

Sherchan Wanita, Jayaraman Prem P, Krishnaswamy Shonali, Zaslavsky Arkady, Loke Seng, Sinha Abhijat. Using on-the-move mining for mobile crowdsensing. In: Mobile Data Management (MDM) IEEE 13th International Conference on. IEEE; 2012. p. 115-24.

Kumar Pardeep, Udayabhanu NPG. Raju, protected combination of Artificial Neural Network with wireless sensor networks. Int J Eng Adv Technol (IJEAT). April 2019;8(4):08 13.

Neto F, Ribeiro C. Dynamic change of services in wireless sensor network middleware based on semantic technologies. p. 58 63 [online]. doi: 10.1109/ICAS.2010.17; 2010. In: Autonomic and autonomous systems (ICAS) Sixth International Conference on, March 2010.

Abowd GD, Dey AK, Brown PJ, Davies N, Smith M, Steggles P. Towards a better understanding of context and context-awareness. Lecture Notes in Computer Science. Proceedings of the 1st international symposium on Handheld and Ubiquitous Computing, ser. HUC 99. London, UK. 1999:304-7 [online]. doi: 10.1007/3-540-48157-5_29.

Oteafy Sharief MA, Al-Turjman Fadi M, Hassanein Hossam S. Pruned adaptive routing in the heterogeneous internet of things, global communications conference (GLOBECOM). IEEE, PP. 2012;214:219, ISSN: 1930-529X.

Bello Oladayo, Zeadally Sherali. Intelligent device-to-device communication in the internet of things. IEEE Systems Journal;10(3):1172-82. doi: 10.1109/JSYST.2014.2298837.

Abowd GD, Mynatt ED. Charting past, present, and future research in ubiquitous computing. ACM Trans Comput-Hum Interact. March 2000;7(1):29-58. doi: 10.1145/344949.344988.

Bellavista P, Corradi A, Fanelli M, Foschini L. A survey of context data distribution for mobile ubiquitous systems, ACM Computing Surveys, vol. xx, no. xx, p. Vol. 49; 2013.

Frey Michael, Grose Friedrich, Gunes Mesut. Energy-aware ant routing in wireless multi-hop networks, IEEE international conference on communications (ICC); 2014. p. 190-6.

Iova Oana, Theoleyre Fabrice, Noel Thomas. Using multiparent routing in RPL to increase the stability and the lifetime of the network. Ad Hoc Netw. 2015;29:45-62. doi: 10.1016/j.adhoc.2015.01.020.

Ala al-Fuqaha, Mohsen Guizani, Mehdi Mohammadi, Mohammed Aledhari, Moussa Ayyash. Internet of things: A survey on enabling technologies, protocols, and applications.

Internet of things by the numbers: what new surveys found by Gil Press Senior Contributor, enterprise & cloud. Available from: https://www.forbes.com/sites/gilpress/2016/09/02/internet-of-things-by-the-numbers-what-new-surveys-found/#1b82c1ad16a0.

Internet of things meets the military and battlefield—connecting gear and biometric wearables for an IoMT and IoBT by Lori Cameron. Available from: https://www.computer.org/publications/tech-news/research/internet-of-military-battlefield-things-iomt-iobt.

Internet of everything: the IoT market is projected to expand. In: Vol. 12x. PMID 20172023 by Justin Baker. Available from: https://www.experfy.com/blog/internet-of-everything-the-iot-market-is-projected-to-expand-12x-from-2017-2023/.

What is the IoT? https://nordigi.no/index.php/en/blog/55-what-is-the-iot

Jurcut Anca D, Ranaweera Pasika, Xu Lina. Introduction to IoT security. Ireland: University College Dublin Press. School of Computer Science. Available from: http://www.researchgate.net/publication/336406296_Introduction_to_IoT_Security.

Rajiv. What are the major components of Internet of Things. Available from: https://www.rfpage.com/what-are-the-major-components-of-internet-of-things/?

Top 5 wireless technologies for IoT and 5G networks by Rajiv. Available from: https://www.rfpage.com/top-wireless-technologies-iot-5g-networks/.

Six types of IoT network protocols by Naveen Joshi Allerin Saturday, 07 December 2019. Available from: https://www.allerin.com/blog/six-types-of-iot-network-protocols.

Internet of things (IoT)—Part 4 (Network Protocols and Architecture) by Sukanya Mandal. Available from: https://www.c-sharpcorner.com/UploadFile/f88748/internet-of-thingsiot-part-4-network-protocols-and-arc/.

Building an open end-to-end internet of things architecture by David Bericat Lacima, Red Hat. Available from: https://next.redhat.com/2017/12/19/building-an-open-end-to-end-internet-of-things-architecture/.

Customary homes to smart homes using internet of things (IoT) and mobile application by Vignesh Govindraj. Phanini Academy of Education, Mithileysh Sathiyanarayanan. Institute of Technology & Nigeria: Management. Count on US. R&D, Babangida Abubakar. Katsina State. Available from: https://www.researchgate.net/publication/325516236_Customary_homes_to_smart_homes_using_Internet_of_Things_IoT_and_mobile_applicationhttps://www. Available from: http://redappletech.com/iot-home-automation/.

IoT Security 2020 trends: solutions, technologies, challenges, platform, companies by Harshita Khangarot. IoT Security Major Problems Faced by IoT System by dataflair team ·updated ·September 15, 2018. Available from: https://www.brsoftech.com/blog/iot-security-solutions-technologies-challenges-platform. Available from: https://data-flair.training/blogs/iot-security/.

Iot security: challenges, solutions & future prospects by Mikhail Gloukhovtsev, Sr. Solutions Architect, Digital Solutions, Cloud & IoT. Orange Business Services. Available from: https://education.dellemc.com/content/dam/dell-emc/documents/en-us/2018KS_GloukhovtsevIoT_Security_Challenges_Solutions_and_Future_Prospects.pdf.

IoT solutions for smart home solution. Internet of Things (IoT) essential IoT business guide. Available from: https://www.ecosmob.com/iot-solutions-smart-home-automation-future-technology/#2

The Internet of Things (IoT) essential IoT business guide. The. Available from: https://www.i-scoop.eu/internet-of-things-guide/.

Li da Xu, Wu HE, Shancang Li. Internet of things in industries: A survey.

Kumar JS, Patel Dhiren R. A survey on internet of things: security and privacy issues. Top 5 Benefits of Cellular IoT.

Top 5 Benefits of Cellular IoT. https://blog.jtiot.com/top-5-benefits-of-cellular-iot


Refbacks

  • There are currently no refbacks.