Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Security Challenges and Solutions in the Internet of Things

View through CrossRef
The Internet of Things (IoT) is pervasive in today's world and may be located almost throughout. It is employed in smart cities for things like highways and clinics, as well as in smart buildings for things like regulating doors and air conditioner units, avoiding fires, and many other things. The Internet of Things (IoT) refers to a set of interconnected computing devices that may communicate with one another by exchanging data over the internet. This provides the opportunity for the attacker to penetrate the IoT technologies and get the important data they contain. The restricted measure performance of IoT systems is the source of the issue, as they make it impossible to implement the conventional security mechanism on these devices. As a result of this constraint, it is necessary to propose lightweight algorithms that are capable of supporting IoT devices. However, Internet of Things (IoT) safety and confidentiality are important challenges that might impede the technology's long-term growth. In this study, we have addressed the security of the internet of things from two primary vantage points, namely, IoT design and protocols. We cover the many levels that make up the architecture of the Internet of Things (IoT), as well as the security problems that are connected with those layers and the possible alternatives to those concerns. We went through a variety of protocols that are used in the layered evolution of the Internet of Things, as well as the security mechanisms that were built for every protocol
Title: Security Challenges and Solutions in the Internet of Things
Description:
The Internet of Things (IoT) is pervasive in today's world and may be located almost throughout.
It is employed in smart cities for things like highways and clinics, as well as in smart buildings for things like regulating doors and air conditioner units, avoiding fires, and many other things.
The Internet of Things (IoT) refers to a set of interconnected computing devices that may communicate with one another by exchanging data over the internet.
This provides the opportunity for the attacker to penetrate the IoT technologies and get the important data they contain.
The restricted measure performance of IoT systems is the source of the issue, as they make it impossible to implement the conventional security mechanism on these devices.
As a result of this constraint, it is necessary to propose lightweight algorithms that are capable of supporting IoT devices.
However, Internet of Things (IoT) safety and confidentiality are important challenges that might impede the technology's long-term growth.
In this study, we have addressed the security of the internet of things from two primary vantage points, namely, IoT design and protocols.
We cover the many levels that make up the architecture of the Internet of Things (IoT), as well as the security problems that are connected with those layers and the possible alternatives to those concerns.
We went through a variety of protocols that are used in the layered evolution of the Internet of Things, as well as the security mechanisms that were built for every protocol.

Related Results

Connecting the dots: Internet of things and human resource management
Connecting the dots: Internet of things and human resource management
With each organization gradually turning out to be based on innovation to better supervise business activities, HR pioneers must choose the option to adjust to advancements in like...
Russian Bases Abroad: Security Policy or Power Projection?
Russian Bases Abroad: Security Policy or Power Projection?
After the collapse of the bipolar system, the Soviet Union, and then its heir, the Russian Federation, lost its position as a global player in favour of US hegemony. The arms race ...
Net Tarot in New Delhi
Net Tarot in New Delhi
This paper examines the future of the internet in the developing world by examining the discourse of advertising. Based on a visual record of New Delhi and textual analysis of adve...
'Invitation to a Mourning Ceremony': Perspectives on the Uyghur Internet
'Invitation to a Mourning Ceremony': Perspectives on the Uyghur Internet
AbstractThis paper offers a historically located and sociopolitical reading of the Uyghur internet, focusing on Uyghur language sites which were legally operating within China and ...
SECURITY AND PRIVACY MECHANISM USING BLOCKCHAIN
SECURITY AND PRIVACY MECHANISM USING BLOCKCHAIN
Block chain being a foundational technology impacting and attracting a wide range of applications has become predominant in solving the problem of privacy preserving and security i...
A Proposed Optimization Model for Water Quality Prediction in Internet of Things Environment
A Proposed Optimization Model for Water Quality Prediction in Internet of Things Environment
The application of industrialization and urbanization strategies results in the proliferation of waste products in water resources which is a serious public challenge. They have re...
Contemporary Terrorist Challenges and Threats in Europe
Contemporary Terrorist Challenges and Threats in Europe
This article generally contains two parts. One is a theoretical approach to dealing with the phenomenon of terrorism as well as international terrorism. Within the first part, a un...
Evaluation of Performance of Cloud of Things (CoT) for Transferring Multimedia and Bulk-set Data
Evaluation of Performance of Cloud of Things (CoT) for Transferring Multimedia and Bulk-set Data
As the number of context-aware and unique data extracting and computing has grown leaps and bounds, paving way to their application in many platforms, Internet of Things (IoT) has ...

Back to Top