Emprical Study of Iot Solution for The Security Threats In Real Life Scenario: State of The Art

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    IoT technology and applications represents security as a significant issue for facilitating the tremendous implementation.     Devoid of IoTs technology ensures the device level confidentiality, privacy and authenticity. The applicable users are not going to     undertake answers for security in IoT in huge scale. The earlier stage deployments of IoT devices are primarily based on RFIDs         technology which results in simplest, security solutions inside the principal been devised in an advert hoc manner [8]. This brings the fact that such deployments were typically vertically incorporated, with all additives beneath the manage of a single administrative entity. In the angle of an IoT eco-system, in which unique person may be worried in a given software state of affairs. One person owing the      physical operations of  sensors, one stakeholder deals with the statistics and processing them and other numerous stakeholders supplies different services based totally on such statistics to the customers. This leads to numerous variety of safety demanding situations and security for the IoT. In this paper, we address the revisited security issues and discuss the critical safety protection conditions of Internet of Things era into a mainstream. To support this, the three key problems requiring cutting-edge techniques includes are data               confidentiality, privacy and trust.

    In this review, we presented net factors with architectural design goals of IoT. We surveyed security and privacy issues in IoTs. Also the discussion on several open issues based on the privacy and security is addressed. Many real time applications of IoTs in real life treats the security issues of IoT as a main factor. Thus the IoT of complicated security issues have been anticipated the researchers to address.


  • Keywords

    of things (IoTs), Privacy, Security, eHealth monitoring systems, Data confidentiality.

  • References

      [1] K. Zhao and L. Ge. “A Survey on the Internet of Things Security,” Proc. 9th Int’l Conf. Computational Intelligence and Security (CIS), 2013,pp. 663–667.

      [2] Q. Jing et al., “Security of the Internet of Things: Perspectives and Challenges,” Wireless Networks, vol. 20, no. 8, 2014, pp. 2481–2501.

      [3] H. Feng and W. Fu, “Study of Recent Development about Privacy and Security of the Internet of Things,” Proc. Int’l Conf. Web Information Systems and Mining (WISM), 2010, pp. 91–95.

      [4] D. Puthal et al., “A Dynamic Prime Number Based Efficient Security Mechanism for Big Sensing Data Streams,” to be published in Computer and System Sciences, 2016; http://dx.doi. org/10.1016/j.jcss.2016.02.005.

      [5] J. Gubbi et al., “Internet of Things (IoT): A Vision, Architectural Elements, and Future Directions,” Future Generation Computer Systems, vol. 29, no. 7, 2013, pp. 1645–1660.

      [6] L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: A Survey,” Computer Networks,vol. 54, no. 15, 2010, pp. 2787–2805.

      [7] Hewlett Packard (HP), Internet of Things Research Study. 2015. DOI: http://www8.hp.com/h20195/V2/GetPDF. aspx/4AA5-4759ENW.pdf

      [8] Jung T. K. 2013. Analyses of Integrated Security Framework with Embedded RFID System for Wireless Network Architecture. Journal of Convergence Information Technology Vol 8. No. 14 2013.

      [9] S. K. Datta, C. Bonnet, and N. Nikaein, “An IoT gateway centric architecture to provide novel m2m services,” in Proceedings of the World Forum on Internet of Things (WF-IoT). IEEE, 2014, pp. 514–519.

      [10] D. Lake, R. Milito, M. Morrow, and R. Vargheese, “Internet of Things: Architectural framework for ehealth security,” Journal of ICT Standardization, River Publishing, vol. 1, 2014.

      [11] H. Abie and I. Balasingham, “Risk-based adaptive security for smart IoT in eHealth,” in Proceedings of the 7th International Conference on Body Area Networks. ICST, 2012, pp. 269–275.

      [12] Perrig, J. Stankovic, and D. Wagner, “Security in wireless sensor networks,” Communications of the ACM, vol. 47, no. 6, pp. 53–57, 2004.

      [13] S. Sastry, S. Sulthana, and S. Vagdevi, “Security threats in wireless sensor networks in each layer,” Int. J. Advanced Networking and Applications, vol. 4, no. 04, pp. 1657–1661, 2013.




Article ID: 13792
DOI: 10.14419/ijet.v7i2.19.13792

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.