Javascript must be enabled to continue!
Security Challenges and Solutions in the Internet of Things
View through CrossRef
The Internet of Things (IoT) is pervasive in today's world and may be located almost throughout. It is employed in smart cities for things like highways and clinics, as well as in smart buildings for things like regulating doors and air conditioner units, avoiding fires, and many other things. The Internet of Things (IoT) refers to a set of interconnected computing devices that may communicate with one another by exchanging data over the internet. This provides the opportunity for the attacker to penetrate the IoT technologies and get the important data they contain. The restricted measure performance of IoT systems is the source of the issue, as they make it impossible to implement the conventional security mechanism on these devices. As a result of this constraint, it is necessary to propose lightweight algorithms that are capable of supporting IoT devices. However, Internet of Things (IoT) safety and confidentiality are important challenges that might impede the technology's long-term growth. In this study, we have addressed the security of the internet of things from two primary vantage points, namely, IoT design and protocols. We cover the many levels that make up the architecture of the Internet of Things (IoT), as well as the security problems that are connected with those layers and the possible alternatives to those concerns. We went through a variety of protocols that are used in the layered evolution of the Internet of Things, as well as the security mechanisms that were built for every protocol
American Scientific Publishing Group
Title: Security Challenges and Solutions in the Internet of Things
Description:
The Internet of Things (IoT) is pervasive in today's world and may be located almost throughout.
It is employed in smart cities for things like highways and clinics, as well as in smart buildings for things like regulating doors and air conditioner units, avoiding fires, and many other things.
The Internet of Things (IoT) refers to a set of interconnected computing devices that may communicate with one another by exchanging data over the internet.
This provides the opportunity for the attacker to penetrate the IoT technologies and get the important data they contain.
The restricted measure performance of IoT systems is the source of the issue, as they make it impossible to implement the conventional security mechanism on these devices.
As a result of this constraint, it is necessary to propose lightweight algorithms that are capable of supporting IoT devices.
However, Internet of Things (IoT) safety and confidentiality are important challenges that might impede the technology's long-term growth.
In this study, we have addressed the security of the internet of things from two primary vantage points, namely, IoT design and protocols.
We cover the many levels that make up the architecture of the Internet of Things (IoT), as well as the security problems that are connected with those layers and the possible alternatives to those concerns.
We went through a variety of protocols that are used in the layered evolution of the Internet of Things, as well as the security mechanisms that were built for every protocol.
Related Results
Implementing Security in IOT Systems Via Blockchain
Implementing Security in IOT Systems Via Blockchain
With today’s day and age rapidly going digital, the emergence of Internet of Things has become prominent and IoT systems are now being applied to almost every field. IoT systems ca...
Connecting the dots: Internet of things and human resource management
Connecting the dots: Internet of things and human resource management
With each organization gradually turning out to be based on innovation to better supervise business activities, HR pioneers must choose the option to adjust to advancements in like...
Russian Bases Abroad: Security Policy or Power Projection?
Russian Bases Abroad: Security Policy or Power Projection?
After the collapse of the bipolar system, the Soviet Union, and then its heir, the Russian Federation, lost its position as a global player in favour of US hegemony. The arms race ...
Improving ICS security through Honeynets and Machine Learning techniques
Improving ICS security through Honeynets and Machine Learning techniques
Abstract
Abstract The internet of things(IoT), the Industrial Internet of Things (IIoT), and Cyber-Physical Systems (CPS) can be seen everywhere, Home applications, Buildin...
LIVELIHOOD SECURITY OF SCHEDULED CASTE FARMERS THROUGH INTEGRATED FARMING SYSTEM
LIVELIHOOD SECURITY OF SCHEDULED CASTE FARMERS THROUGH INTEGRATED FARMING SYSTEM
The study was conducted in purposively selected Chickballapura district, a total sample of 271 respondents was purposively selected for the study. Data was collected by using struc...
ANDROID BASED SECURITY AND REMOTE SURVEILANCE SYSTEM
ANDROID BASED SECURITY AND REMOTE SURVEILANCE SYSTEM
Mobile phones have been important Electronic devices in our life. Consequently, Home automation and security system becomes one of the prominent futures on mobile devices. In this ...
Net Tarot in New Delhi
Net Tarot in New Delhi
This paper examines the future of the internet in the developing world by examining the discourse of advertising. Based on a visual record of New Delhi and textual analysis of adve...
'Invitation to a Mourning Ceremony': Perspectives on the Uyghur Internet
'Invitation to a Mourning Ceremony': Perspectives on the Uyghur Internet
AbstractThis paper offers a historically located and sociopolitical reading of the Uyghur internet, focusing on Uyghur language sites which were legally operating within China and ...