IoT Security and Privacy Regime/Challenges in All Domains of IoT
VerifiedAdded on 2023/06/13
|6
|6888
|416
AI Summary
This report discusses the challenges and security issues associated with IoT in all domains. It covers the importance of privacy and security in IoT and how it affects the productivity and quality of connected devices. The report includes a literature review, problem statement, and the use of machine learning technology in IoT. It also covers commercial issues, connectivity, and the requirements for the project.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: INTERNET OF THINGS
IoT Security and Privacy
Regime/challenges in all domains of IoT
Abstract
The new wave of connectivity is applied beyond laptops and smart
phones. On the other hand, the innovation for connected cars,
wearable devices, smart home and connected healthcare is also
increasing day by day. Hence, it becomes important to increase the
number connected devices that process internet of things.
According to the report published by Gartner 2020, the connected
devices across technologies will research to 20.6 billion. The
devices have ability to bridge the particular gap for improving
quality and productivity. Moreover, IoT catching up smart homes
that are generally considered as one of the most awaited
deployment of brands that are getting into competition with smart
appliances. The problems are included with its nature of IoT. It is
associated with remote devices and frameworks. In addition, it
provides information stream among the devices as well as
decentralized service systems. On the other hand, with rapid
growing devices, security and privacy issues are increasing. In this
perspective, it becomes important to investigate the security and
privacy issues involved with that is achieved in the current study.
Keywords: IoT, security issues,
1. The problem or challenges
i. Introduction to the problem and domain
The internet of things (IoT) is captivating organisations for its
potential benefits rapidly transforming business and lives of
people. It is believed that IoT will precipitate a major shift in
people similar to the process transformed the way people
communicate and share information. IoT comprises devices as well
as sensors interacting as well as communicating with different
machines, objects and environments. However, privacy and
security issues are also involved with the use of IoT in all its
applications. Insufficient authentication or authorization is one of
the major issues faced while using IoT in all domains of IoT. In
addition, lack of transport encryption, default credentials, lack of
secure code practices make people awaken to use IoT. Apart from
these, devices used in healthcare domain gather personal
information. However, several devices transmit information across
the networks without posing information. Hence, privacy concern
is one of the major challenges faced by IoT users.
ii. Structure of the report
The report covers four milestones. First milestone deals with
analysing the topic of the report. In includes the purpose of the
report. In the present report, IoT Security and Privacy
Regime/challenges in all domains of IoT has been selected for
analysis. In addition, the expected format of the report is described
under this milestone. In addition, problem statement based on the
selected topic is discussed. Apart from these, an executive
summary as a form of abstract is presented in this milestone.
The second milestone covers with introductory explanation of the
problem and domain. Moreover, structure of the report is explained
in this milestone.
The third milestone covers literature review related to IoT Security
and Privacy Regime/challenges in all domains of IoT. The
literature about the topic in past and current work is discussed in
this milestone by using primo search. After completion of
literature, structure in chronological order and summary of the
review is provided. In addition, the list of requirements for the
project and selection of the requirements is achieved in this
milestone. On the other hand, modification of the problem
statement if required and current as well as past methodologies
used to solve the issues are described in this section of the report.
In the forth milestone, purpose, scope, method, recommendation
and conclusion are described in the form of summary of the report.
In addition, literature review based on past and current work is
explained in this milestone. Each of the methodologies used in the
past and present work is also discussed. Apart from this, the
methodologies are compared and best methodology suited to the
application based on the several factors is selected with appropriate
cause of selection.
2. Introduction:
The internet of things includes the organization and the
communication of various gadgets. Countless are associated
together in a system. Every one of the gadgets are associated and
the gadgets can interface with each other. The different uses of the
internet of things, for example, the smart city or the shrewd road
lighting framework can without much of a stretch be controlled by
the utilization of machine learning. The machine learning idea
thinks about the different information and advances the ideal
arrangement. The idea of machine learning can likewise be utilized
for finding the digital security arrangements. The report
demonstrates how the idea of machine learning innovation can be
utilized as a part of internet of things for settling on insightful
choices. The report likewise advances the strategies
3. Purpose of the report
The internet of things idea is the interconnection of an extensive
number of gadgets to a specific system that will help in the
organization with alternate gadgets that are available in the system.
The gadgets may include the different sensors, actuators and the
other vital gadgets [1]. The organization with a similar system
helps in connection with the vast number of gadgets in the
meantime. In the event that any message is to be presented on
countless in the meantime then the utilization of the internet of
things can be conveyed to rehearse. The machine learning process
includes the utilization of the framework with a specific end goal
to distinguish the conceivable results from a specific task [2]. The
machine learning process is useful in the execution of the different
errands. The new type of assignments that the machine will most
likely be unable to perform is recorded and the arrangement is
advised to the machine from alternate sources. The arrangement,
which was new to the machine is currently put away in the
machine to such an extent that if such an issue emerges later on
then the assignment would be unraveled effortlessly by the
machine learning process. The machine learning will most likely
be unable to discover a few arrangements or foresee various things.
The utilization of internet of things innovation might be useful in
the finding of the different arrangements. The framework or the
gadgets that are associated with the internet of things structure can
have the capacity to discover the answer for the framework.
4. Expected format of the report
The report examines about how machine learning can be utilized as
a part of the basic leadership shrewdly in the internet of things
organize. The report introduces a writing survey, which advances
the works in the subject, which is to be talked about. The report
IoT Security and Privacy
Regime/challenges in all domains of IoT
Abstract
The new wave of connectivity is applied beyond laptops and smart
phones. On the other hand, the innovation for connected cars,
wearable devices, smart home and connected healthcare is also
increasing day by day. Hence, it becomes important to increase the
number connected devices that process internet of things.
According to the report published by Gartner 2020, the connected
devices across technologies will research to 20.6 billion. The
devices have ability to bridge the particular gap for improving
quality and productivity. Moreover, IoT catching up smart homes
that are generally considered as one of the most awaited
deployment of brands that are getting into competition with smart
appliances. The problems are included with its nature of IoT. It is
associated with remote devices and frameworks. In addition, it
provides information stream among the devices as well as
decentralized service systems. On the other hand, with rapid
growing devices, security and privacy issues are increasing. In this
perspective, it becomes important to investigate the security and
privacy issues involved with that is achieved in the current study.
Keywords: IoT, security issues,
1. The problem or challenges
i. Introduction to the problem and domain
The internet of things (IoT) is captivating organisations for its
potential benefits rapidly transforming business and lives of
people. It is believed that IoT will precipitate a major shift in
people similar to the process transformed the way people
communicate and share information. IoT comprises devices as well
as sensors interacting as well as communicating with different
machines, objects and environments. However, privacy and
security issues are also involved with the use of IoT in all its
applications. Insufficient authentication or authorization is one of
the major issues faced while using IoT in all domains of IoT. In
addition, lack of transport encryption, default credentials, lack of
secure code practices make people awaken to use IoT. Apart from
these, devices used in healthcare domain gather personal
information. However, several devices transmit information across
the networks without posing information. Hence, privacy concern
is one of the major challenges faced by IoT users.
ii. Structure of the report
The report covers four milestones. First milestone deals with
analysing the topic of the report. In includes the purpose of the
report. In the present report, IoT Security and Privacy
Regime/challenges in all domains of IoT has been selected for
analysis. In addition, the expected format of the report is described
under this milestone. In addition, problem statement based on the
selected topic is discussed. Apart from these, an executive
summary as a form of abstract is presented in this milestone.
The second milestone covers with introductory explanation of the
problem and domain. Moreover, structure of the report is explained
in this milestone.
The third milestone covers literature review related to IoT Security
and Privacy Regime/challenges in all domains of IoT. The
literature about the topic in past and current work is discussed in
this milestone by using primo search. After completion of
literature, structure in chronological order and summary of the
review is provided. In addition, the list of requirements for the
project and selection of the requirements is achieved in this
milestone. On the other hand, modification of the problem
statement if required and current as well as past methodologies
used to solve the issues are described in this section of the report.
In the forth milestone, purpose, scope, method, recommendation
and conclusion are described in the form of summary of the report.
In addition, literature review based on past and current work is
explained in this milestone. Each of the methodologies used in the
past and present work is also discussed. Apart from this, the
methodologies are compared and best methodology suited to the
application based on the several factors is selected with appropriate
cause of selection.
2. Introduction:
The internet of things includes the organization and the
communication of various gadgets. Countless are associated
together in a system. Every one of the gadgets are associated and
the gadgets can interface with each other. The different uses of the
internet of things, for example, the smart city or the shrewd road
lighting framework can without much of a stretch be controlled by
the utilization of machine learning. The machine learning idea
thinks about the different information and advances the ideal
arrangement. The idea of machine learning can likewise be utilized
for finding the digital security arrangements. The report
demonstrates how the idea of machine learning innovation can be
utilized as a part of internet of things for settling on insightful
choices. The report likewise advances the strategies
3. Purpose of the report
The internet of things idea is the interconnection of an extensive
number of gadgets to a specific system that will help in the
organization with alternate gadgets that are available in the system.
The gadgets may include the different sensors, actuators and the
other vital gadgets [1]. The organization with a similar system
helps in connection with the vast number of gadgets in the
meantime. In the event that any message is to be presented on
countless in the meantime then the utilization of the internet of
things can be conveyed to rehearse. The machine learning process
includes the utilization of the framework with a specific end goal
to distinguish the conceivable results from a specific task [2]. The
machine learning process is useful in the execution of the different
errands. The new type of assignments that the machine will most
likely be unable to perform is recorded and the arrangement is
advised to the machine from alternate sources. The arrangement,
which was new to the machine is currently put away in the
machine to such an extent that if such an issue emerges later on
then the assignment would be unraveled effortlessly by the
machine learning process. The machine learning will most likely
be unable to discover a few arrangements or foresee various things.
The utilization of internet of things innovation might be useful in
the finding of the different arrangements. The framework or the
gadgets that are associated with the internet of things structure can
have the capacity to discover the answer for the framework.
4. Expected format of the report
The report examines about how machine learning can be utilized as
a part of the basic leadership shrewdly in the internet of things
organize. The report introduces a writing survey, which advances
the works in the subject, which is to be talked about. The report
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1INTERNET OF THINGS
talks about the different strategies that can be utilized as a part of
request to actualize the machine learning process in the internet of
things. The different strategies are then thought about on the
different fields and afterward the best strategy that suits the task is
then chosen.
5. Problem statement
Fast improvements in equipment, programming and
correspondence innovations have permitted the rise of internet
associated tactile gadgets. It gives perception and also information
estimation from physical world. It is assessed that aggregate
number of internet associated gadgets will be utilized between 20
to 25 billion by 2020 [3]. As the numbers increment and
advancements end up develop, the volume of date distributed will
likewise increment. The internet associated gadgets innovation are
alluded as IOT that keeps on broadening current internet through
giving network and connection amongst physical and digital
volumes. Additionally, expanded volume of IoT creates Big Data
portrayed by speed as far as area and time reliance.
6. Introduction to the Problem:
A large number of the organization cannot take choices in an
appropriate way. Because of the wrong choices taken by the
organization, a large number of the tasks wind up in
disappointment. Subsequently the settling on of the best possible
choices is vital for the smooth running of the organization [4]. The
settling on of the clever choices, for example, the utilization of the
right type of innovation for the right object is required. The
fundamental issue lies in the decision of the innovation and the
examination of the innovation. An appropriate cost investigation
for the usage of the innovation ought to be done as such that the
organization does not need to confront the issue in the later half.
7. Structure of the Report:
The report examines about the subject and the reason that the
report illuminates. The report examines about the idea of the
internet of things and the machine learning innovation. The report
at that point examines how the machine learning procedure can be
utilized for the taking of the insightful choices in the IoT in an
organization [5]. The writing survey displays the utilization of the
machine learning idea beforehand and by and by for the settling on
of the clever choices. The utilization of the different organization
has been made with a specific end goal to appropriately
comprehend the idea of usage of the machine learning and
demonstrate crafted by the past and the current circumstances. The
three sections of the reports include:
•The Introduction of the report containing the reason for the report,
the structure of the report and the synopsis of the report
•The second part includes the writing survey, which gives the
different data based on the past and the present works that is
finished.
•The last piece of the report includes the different systems that are
included and the strategy, which is appropriate for the present
situation.
8. Literature Review:
Current and previous works
The learning procedure can be useful in the recognizable proof of
the procedure of the will be great and what might influence in an
awful way. The utilization of machine inclining can be made
keeping in mind the end goal to comprehend what choice must be
taken to profit. The machine learning makes the utilization of
different types of methods and aides in the recognizable proof
without bounds extent of the choice [6]. This is the means by
which the idea of machine learning can be settled on to settle on
the essential choices in the field of internet of things. The internet
of things can give various answers for a specific theme. Among
these arrangements the most productive arrangement is to be
discovered, which should be possible with the assistance of
machine learning process. The perceptive choice that will be taken
for this situation is finished with the assistance of machine
learning. The machine learning procedure can help in the
investigating of the different information on the fields of the
diverse arrangements that are given. The information that best
speaks to the positives for a specific arrangement is then chosen.
The system of machine learning can be broadened encourage into
the different other fields. This will help in the breaking down of the
information [7]. The machine adapting fundamentally plays out the
errand of the information examination and advances the ideal
arrangement in light of the past arrangement that had happened
previously.
The Google makes the utilization of machine figuring out how to
ceaselessly enhance its status and position in the market. The
Google gives the best list items and the most compacted list items
by making the utilization of the machine learning innovation. The
machine learning innovation execution helps Google in giving the
administrations it keeps on giving over the years [8]. The idea of
machine learning has likewise been connected to the different
photographs and the recordings of the Google, which additionally
helps in the administration of the substantial number of
photographs and recordings in an effective way. The machine
learning methodology can likewise deal with the tremendous
measure of the information. The photographs and the recordings,
which must be appeared to the are checked with the assistance of
the machine learning. In this manner, all these imperative and the
savvy choices are taken with the assistance of the machine learning
idea.
9. Requirement for the Project:
The project requires prepared work force for the doing the task as
the innovation must be connected in an appropriate way. The
frameworks ought to be in an appropriate working condition as the
despicable working of one may prompt the uncalled for working of
alternate frameworks. This may occur as every one of the
frameworks is associated by the assistance of internet of innovation
[8]. In the event that any of the frameworks is helpless against
assault then the other may likewise have a possibility of being
assaulted. Every one of the prerequisites for the best possible
execution of the machine learning idea ought to be
10. Commercial issues
There are extensive number of issues can be experienced like
security, costing model, charging model and administration level
understanding and place of relocation.
Security: It is largely cleared from the viewpoint that security
issues played an imperative sort of part in the area of distributed
computing. With no sort of uncertainty, putting of information is
thought to be an essential sort of thing. It for the most part
concocts different sorts of issues like loss of information, phishing
and ultimately botnet.
Costing Model: Cloud based shoppers might be thought to be
imperative for calculation and reconciliation. The cost of joining of
information can be thought to be imperative part convention and
different sorts of interfaces.
Charging Model: From the thought or rationale of different sorts
of flexible assets last sort of thought has been given with respect to
consistent sort of server farms. For Sass based cloud suppliers the
cost required with different sorts of advertising. This is for the
most part comprehensive of update and redevelopment.
talks about the different strategies that can be utilized as a part of
request to actualize the machine learning process in the internet of
things. The different strategies are then thought about on the
different fields and afterward the best strategy that suits the task is
then chosen.
5. Problem statement
Fast improvements in equipment, programming and
correspondence innovations have permitted the rise of internet
associated tactile gadgets. It gives perception and also information
estimation from physical world. It is assessed that aggregate
number of internet associated gadgets will be utilized between 20
to 25 billion by 2020 [3]. As the numbers increment and
advancements end up develop, the volume of date distributed will
likewise increment. The internet associated gadgets innovation are
alluded as IOT that keeps on broadening current internet through
giving network and connection amongst physical and digital
volumes. Additionally, expanded volume of IoT creates Big Data
portrayed by speed as far as area and time reliance.
6. Introduction to the Problem:
A large number of the organization cannot take choices in an
appropriate way. Because of the wrong choices taken by the
organization, a large number of the tasks wind up in
disappointment. Subsequently the settling on of the best possible
choices is vital for the smooth running of the organization [4]. The
settling on of the clever choices, for example, the utilization of the
right type of innovation for the right object is required. The
fundamental issue lies in the decision of the innovation and the
examination of the innovation. An appropriate cost investigation
for the usage of the innovation ought to be done as such that the
organization does not need to confront the issue in the later half.
7. Structure of the Report:
The report examines about the subject and the reason that the
report illuminates. The report examines about the idea of the
internet of things and the machine learning innovation. The report
at that point examines how the machine learning procedure can be
utilized for the taking of the insightful choices in the IoT in an
organization [5]. The writing survey displays the utilization of the
machine learning idea beforehand and by and by for the settling on
of the clever choices. The utilization of the different organization
has been made with a specific end goal to appropriately
comprehend the idea of usage of the machine learning and
demonstrate crafted by the past and the current circumstances. The
three sections of the reports include:
•The Introduction of the report containing the reason for the report,
the structure of the report and the synopsis of the report
•The second part includes the writing survey, which gives the
different data based on the past and the present works that is
finished.
•The last piece of the report includes the different systems that are
included and the strategy, which is appropriate for the present
situation.
8. Literature Review:
Current and previous works
The learning procedure can be useful in the recognizable proof of
the procedure of the will be great and what might influence in an
awful way. The utilization of machine inclining can be made
keeping in mind the end goal to comprehend what choice must be
taken to profit. The machine learning makes the utilization of
different types of methods and aides in the recognizable proof
without bounds extent of the choice [6]. This is the means by
which the idea of machine learning can be settled on to settle on
the essential choices in the field of internet of things. The internet
of things can give various answers for a specific theme. Among
these arrangements the most productive arrangement is to be
discovered, which should be possible with the assistance of
machine learning process. The perceptive choice that will be taken
for this situation is finished with the assistance of machine
learning. The machine learning procedure can help in the
investigating of the different information on the fields of the
diverse arrangements that are given. The information that best
speaks to the positives for a specific arrangement is then chosen.
The system of machine learning can be broadened encourage into
the different other fields. This will help in the breaking down of the
information [7]. The machine adapting fundamentally plays out the
errand of the information examination and advances the ideal
arrangement in light of the past arrangement that had happened
previously.
The Google makes the utilization of machine figuring out how to
ceaselessly enhance its status and position in the market. The
Google gives the best list items and the most compacted list items
by making the utilization of the machine learning innovation. The
machine learning innovation execution helps Google in giving the
administrations it keeps on giving over the years [8]. The idea of
machine learning has likewise been connected to the different
photographs and the recordings of the Google, which additionally
helps in the administration of the substantial number of
photographs and recordings in an effective way. The machine
learning methodology can likewise deal with the tremendous
measure of the information. The photographs and the recordings,
which must be appeared to the are checked with the assistance of
the machine learning. In this manner, all these imperative and the
savvy choices are taken with the assistance of the machine learning
idea.
9. Requirement for the Project:
The project requires prepared work force for the doing the task as
the innovation must be connected in an appropriate way. The
frameworks ought to be in an appropriate working condition as the
despicable working of one may prompt the uncalled for working of
alternate frameworks. This may occur as every one of the
frameworks is associated by the assistance of internet of innovation
[8]. In the event that any of the frameworks is helpless against
assault then the other may likewise have a possibility of being
assaulted. Every one of the prerequisites for the best possible
execution of the machine learning idea ought to be
10. Commercial issues
There are extensive number of issues can be experienced like
security, costing model, charging model and administration level
understanding and place of relocation.
Security: It is largely cleared from the viewpoint that security
issues played an imperative sort of part in the area of distributed
computing. With no sort of uncertainty, putting of information is
thought to be an essential sort of thing. It for the most part
concocts different sorts of issues like loss of information, phishing
and ultimately botnet.
Costing Model: Cloud based shoppers might be thought to be
imperative for calculation and reconciliation. The cost of joining of
information can be thought to be imperative part convention and
different sorts of interfaces.
Charging Model: From the thought or rationale of different sorts
of flexible assets last sort of thought has been given with respect to
consistent sort of server farms. For Sass based cloud suppliers the
cost required with different sorts of advertising. This is for the
most part comprehensive of update and redevelopment.
2INTERNET OF THINGS
Administration level Agreement: Various sorts of cloud shoppers
does not have any sort of control on accessibility, assets and
exhibitions of this sorts of things.
11. Connectivity
Developments of shopper based IOT things like security is thought
to be an essential parameter. A need in any of the above sort of
parameter may prompt certain number of hubs and low ward
prerequisites. It at last prompts expanding number of multifaceted
nature in every sort of hubs. It likewise takes after security related
issues in every sort of hub. Different sorts of new difficulties are
experienced amid securing of information with different sorts of
programming characterizing systems (Kumar et al. 2016). There
are sure number of physical detachment which is in charge with
different virtual situations, which are over the numerous system,
verses the customary sorts of systems. Different sorts of difficulties
are experienced in securing numerous channels for different sorts
of correspondence in contrast with customary sort of systems. The
different sorts of difficulties related with work and appropriation of
riches in regularly expanding area of computerization. Another sort
of issues that can be experienced is the unwavering quality of
different internet organization [9]. The last sort of issue
experienced is machine learning is the security of different sorts of
dangers related with it. This sort of information for the most part
require expanding of refined information logical and different sorts
of calculation which can be utilized for learning.
The devices associate with IoT overcome any gap between
physical and computerized world keeping in mind the end goal to
improve quality and profitability, society and businesses. However,
the issues involved with the idea of IoT itself need to be analyzed
properly. In addition, it is identified with the remote devices and
structures and gives a data stream among contraptions and
decentralized organization systems [10]. The data or even the
devices will be joined into existing legitimate techniques to give
information on the zone, status, development and handiness of
those structures, and information about the overall public who have
and work them.
The amount and the type of information contrasts compared with
different arrangements of big data begin from the long-range social
networking [11]. It tends to touch the base as making consistent
stream and additionally unfaltering pace. In particular, it has been
investigate and broke down that a large portion of the suppliers of
the arrangements expected that the there would be exertion of
safeguarding the Privacy and improving the security, before the
end clients. However, it can arrive in bunches, for example, test
logs adequately handled and passed on straight away. In addition,
it for the most part comes in extensive amounts and collects quick.
There are a few related works occurred with respect to internet of
things that incorporates definition, rule and its applications. As a
rule, the IoT expression alludes to the articles that are empowered
by the internet, collaborate among them, and coordinate for various
and particular objectives to be accomplished.
The term thus the technology claims to enhance the lives of the
people. Taking a case, a basic device can be utilized for the
estimation of the body temperature and heart rate and furthermore
speak with the arrangement of vitality administration, so the
temperature inside the room balanced itself, as indicated by the
physiological status of the person.
Correspondingly, there can be various apparatuses intelligently
initiated for observation cameras checking, smart streetlights and
controls the lights in the rush hour gridlock. The data gathered
would be shared among various partners towards business insight
and its change. Internet of things is interfacing more number of
devices consistently. The advancement conveys different favorable
circumstances as it would change the strategy complete
assignments and also possibly change the entire whole word [11].
On opposite, with fast advancement of IoT, security and Privacy
issues wind up basic piece of IoT applications. The works
identified with internet of things, its utilization, preferences and
impediments are clarified. Additionally, standards of Privacy and
security issues identified with internet of things are clarified in the
present part. In addition, the privacy and security issues are
evaluated that helps to mitigate the concerns.
Privacy can be characterized as an umbrella term that alludes to a
dissimilar and wide related things gathering [13]. Features are
produced using different breaks of security and Privacy, amid the
current years, for example, uncovering of the several private
existences of purchasers, by the unsecured webcams. Report of
Hewlett Packard demonstrates that around 80% of IoT devices
have raised the concerns of security and Privacy.
The technology tending to the big data challenge as exist, as
Hadoop or NoSQL, giving level adaptability, high farthest point
and in addition parallel planning at costs [14]. It makes them direct
alongside reasonable. For the event, IT divisions in endeavors have
not expected to oversee IoT data like amazing dataset in claim
specific right. The fundamental game plans of making up IoT data
that are meeting up in the limit layer comparatively other
unstructured data does. The outcome is conventional capacity
design and additionally administration programming regarding IoT
data as an undefined way from them treats other unstructured data.
In this way, it is vital to look into on security and Privacy issues
incorporated into internet of things.
The IoT would beyond any doubt make the common life to be
more advantageous with less exertion or even easy. However, the
other measurement demonstrates the information gathering
imperceptibility and different worries of procedures of sharing and
utilization [12]. The security and Privacy of the end client, of IoT
can without much of a stretch be focused on. However, the
individual data must be gotten to by the specialist co-ops, towards
the goal of custom fitted administration conveyance.
Storage of data is one of the major challenge faced big data
because of its volume, speed and wide variety. Putting away of big
data in the mists is especially costly. There is a need of creating
standards and calculations, alongside considering of the
spatiotemporal examples of the information use to decide the
estimation of information examination and to safeguard the
datasets by methods for adjusting the cost of the capacity and the
transmission of information as more gathering of big data happens
at a quicker rate. Cloud based capacity has been fit for encouraging
the information mining and accumulation the Privacy and security
have been debilitated by the reconciliation of the enormous
information and the distributed storage.
Information Integrity is one of the essential stages in the security of
enormous information. Trustworthiness primarily alludes to the
way that alteration is conceivable just by the gatherings who are
approved to do as such or by the information proprietor to ensure
that there is no abuse of the information. The expanded utilization
of cloud-based application has furnished the clients with a chance
of putting away and dealing with the information in cloud server
farm. Protecting of the accuracy of the client goes about as one of
the primary difficulties, which is to be tended to.
Because of the introduction of big data and beginning of big data
from various sources has brought about a basic issue for some
cloud suppliers [15]. The issue in regards to the nature of
information quality for the most part alludes to any sort of trouble
that is confronted and is related with at least one than one-quality
Administration level Agreement: Various sorts of cloud shoppers
does not have any sort of control on accessibility, assets and
exhibitions of this sorts of things.
11. Connectivity
Developments of shopper based IOT things like security is thought
to be an essential parameter. A need in any of the above sort of
parameter may prompt certain number of hubs and low ward
prerequisites. It at last prompts expanding number of multifaceted
nature in every sort of hubs. It likewise takes after security related
issues in every sort of hub. Different sorts of new difficulties are
experienced amid securing of information with different sorts of
programming characterizing systems (Kumar et al. 2016). There
are sure number of physical detachment which is in charge with
different virtual situations, which are over the numerous system,
verses the customary sorts of systems. Different sorts of difficulties
are experienced in securing numerous channels for different sorts
of correspondence in contrast with customary sort of systems. The
different sorts of difficulties related with work and appropriation of
riches in regularly expanding area of computerization. Another sort
of issues that can be experienced is the unwavering quality of
different internet organization [9]. The last sort of issue
experienced is machine learning is the security of different sorts of
dangers related with it. This sort of information for the most part
require expanding of refined information logical and different sorts
of calculation which can be utilized for learning.
The devices associate with IoT overcome any gap between
physical and computerized world keeping in mind the end goal to
improve quality and profitability, society and businesses. However,
the issues involved with the idea of IoT itself need to be analyzed
properly. In addition, it is identified with the remote devices and
structures and gives a data stream among contraptions and
decentralized organization systems [10]. The data or even the
devices will be joined into existing legitimate techniques to give
information on the zone, status, development and handiness of
those structures, and information about the overall public who have
and work them.
The amount and the type of information contrasts compared with
different arrangements of big data begin from the long-range social
networking [11]. It tends to touch the base as making consistent
stream and additionally unfaltering pace. In particular, it has been
investigate and broke down that a large portion of the suppliers of
the arrangements expected that the there would be exertion of
safeguarding the Privacy and improving the security, before the
end clients. However, it can arrive in bunches, for example, test
logs adequately handled and passed on straight away. In addition,
it for the most part comes in extensive amounts and collects quick.
There are a few related works occurred with respect to internet of
things that incorporates definition, rule and its applications. As a
rule, the IoT expression alludes to the articles that are empowered
by the internet, collaborate among them, and coordinate for various
and particular objectives to be accomplished.
The term thus the technology claims to enhance the lives of the
people. Taking a case, a basic device can be utilized for the
estimation of the body temperature and heart rate and furthermore
speak with the arrangement of vitality administration, so the
temperature inside the room balanced itself, as indicated by the
physiological status of the person.
Correspondingly, there can be various apparatuses intelligently
initiated for observation cameras checking, smart streetlights and
controls the lights in the rush hour gridlock. The data gathered
would be shared among various partners towards business insight
and its change. Internet of things is interfacing more number of
devices consistently. The advancement conveys different favorable
circumstances as it would change the strategy complete
assignments and also possibly change the entire whole word [11].
On opposite, with fast advancement of IoT, security and Privacy
issues wind up basic piece of IoT applications. The works
identified with internet of things, its utilization, preferences and
impediments are clarified. Additionally, standards of Privacy and
security issues identified with internet of things are clarified in the
present part. In addition, the privacy and security issues are
evaluated that helps to mitigate the concerns.
Privacy can be characterized as an umbrella term that alludes to a
dissimilar and wide related things gathering [13]. Features are
produced using different breaks of security and Privacy, amid the
current years, for example, uncovering of the several private
existences of purchasers, by the unsecured webcams. Report of
Hewlett Packard demonstrates that around 80% of IoT devices
have raised the concerns of security and Privacy.
The technology tending to the big data challenge as exist, as
Hadoop or NoSQL, giving level adaptability, high farthest point
and in addition parallel planning at costs [14]. It makes them direct
alongside reasonable. For the event, IT divisions in endeavors have
not expected to oversee IoT data like amazing dataset in claim
specific right. The fundamental game plans of making up IoT data
that are meeting up in the limit layer comparatively other
unstructured data does. The outcome is conventional capacity
design and additionally administration programming regarding IoT
data as an undefined way from them treats other unstructured data.
In this way, it is vital to look into on security and Privacy issues
incorporated into internet of things.
The IoT would beyond any doubt make the common life to be
more advantageous with less exertion or even easy. However, the
other measurement demonstrates the information gathering
imperceptibility and different worries of procedures of sharing and
utilization [12]. The security and Privacy of the end client, of IoT
can without much of a stretch be focused on. However, the
individual data must be gotten to by the specialist co-ops, towards
the goal of custom fitted administration conveyance.
Storage of data is one of the major challenge faced big data
because of its volume, speed and wide variety. Putting away of big
data in the mists is especially costly. There is a need of creating
standards and calculations, alongside considering of the
spatiotemporal examples of the information use to decide the
estimation of information examination and to safeguard the
datasets by methods for adjusting the cost of the capacity and the
transmission of information as more gathering of big data happens
at a quicker rate. Cloud based capacity has been fit for encouraging
the information mining and accumulation the Privacy and security
have been debilitated by the reconciliation of the enormous
information and the distributed storage.
Information Integrity is one of the essential stages in the security of
enormous information. Trustworthiness primarily alludes to the
way that alteration is conceivable just by the gatherings who are
approved to do as such or by the information proprietor to ensure
that there is no abuse of the information. The expanded utilization
of cloud-based application has furnished the clients with a chance
of putting away and dealing with the information in cloud server
farm. Protecting of the accuracy of the client goes about as one of
the primary difficulties, which is to be tended to.
Because of the introduction of big data and beginning of big data
from various sources has brought about a basic issue for some
cloud suppliers [15]. The issue in regards to the nature of
information quality for the most part alludes to any sort of trouble
that is confronted and is related with at least one than one-quality
3INTERNET OF THINGS
measurements. At first, this goes about as a purpose for the
understanding of the information that is unfit for utilization.
Accordingly, it turns into a very difficult circumstance at whatever
point information of high caliber is to be extricated from a big
measure of gathered information.
The concern in regards to the security keeps on upsetting the
clients who are related with the move of private information from
one area to the distributed storage. Related with the enormous
information mining and examination advancement, the earnestness
of the worry is additionally expanding. There exists a need of
individual data keeping in mind the end goal to deliver comes
about, which are applicable, and this may incorporate
administrations, which are customized and depend on areas.
Legitimate issues exists distinctive laws and directions in various
nations to achieve the security and insurance of the information.
There are numerous nations where it is not permitted to screen the
correspondence of organization staff. IoT likewise has some
protestors who trust that it would disregard Privacy and security or
the living being through broad reconnaissance. Nonetheless, the
essential focal point of the Internet Society is just to develop
associations amongst individuals and foundations in their social,
individual, and monetary lives. The blast of IoT would change the
way clients draw in and trade information. It would have an
alternate impact in the different nations and districts, bringing
about a worldwide pool of difficulties and openings.
Through making connection between a few devices to a system
and empowering information social occasion and investigation,
Internet of things is required adding to make client esteem.
Subsequently, a foundation influences lives of individuals and
monetary exercises turn into a region where IoT is used. In this
point of view, safety efforts for IoT framework are imperative to
be considered. On opposite, an emotional increment in the quantity
of connected devices can make specialized issues like assaults with
more extensive extent of impact alongside assaults.
These gateways play out a few basic capacities, for example,
interpretation of conventions, availability of devices, refreshes,
administration, security, and substantially more, they go about as a
hindrance that confines the stream of immaterial data to and from
the IoT devices [15]. The limited data stream makes the framework
secure and diminishes the danger of system interruptions and data
taking. They utilize different models of administration and
security. It is therefore; the proposal paper centers around the
different door based alleviation measures to deal with the security
and Privacy issues of the IoT organize devices.
12. Methodology
The future experiments regarding IoT Security and Privacy
Regime/challenges in all domains of IoT can be conducted by
using the COIB framework. In order to implement the particular
framework, it is important to note down that the IoT environment
includes high internet connectivity as well as environments with
high internet connectivity along with IoT objects connected to the
particular network. It is achieved in order to ensure that existing
regulation of the functional and operational efficiencies can be
achieved effectively [16]. It assists to minimize security issues
along with privacy issues included in all domains of IoT. The
functional aspects of COIB framework can be helpful to minimize
security issues.
The IT environment can be separated into multiple parts and it is
achieved for coping up the several types of standard configuration
related to the management of network. The different sectors of IoT
have responsibility in order to provide IoT raw data streams as well
as related with the major source of raw data for the specific
segments [18]. The sources of IoT do not include any specific
structure and occurs in terms of ‘level’, ‘scale’ and ‘abstraction’. It
ensures that there is existence of high rate of inconsistency,
incompleteness as well as redundancy. In this aspect, few standard
data schematics are generally utilized in the process associated
with data fusion. The major cause lying behind the purpose is
elimination of the types of anomalies. In this aspect, the big data
aggregators have responsibility for fusion of data over large data
streams. The standard data schematics are utilized in the procedure
associated with data fusion. The elimination would be helpful in
generating clean data associated with management of total. The
IoT security issues classifiers have been working for splitting clean
data into several clusters that is usually dependent on the type of
aspects mainly consisting of behavior, domains as well as
characteristics.
In addition, the major reason for achieving this is ensuring that the
evaluation of data is not difficult to make the process easy for
understanding and use. Thus, for applying several types of data
involved with IoT, it is required to engage operational, production
and status type of data. In this aspect, the Hbase storage is
responsible to take the responsibility associated with scaling and
storing the clusters of data in several types of storage nodes. In the
system, there is potential set of tables that could act in similar way
[17]. This is achieved in way that the table includes row and
column. In addition, there is a requirement for ensuring the process
and making presence of the components defined as primary key.
The implementation architecture of COID framework can be
described as below.
Figure 1: Implementation architecture [3]
(Source: Kidmose and Pedersen 2016 )
In the above figure, it is seen that it includes data center, which is
responsible for executing the aggregation of data and make the
process of clarifying data along with several operations related to
the storage. On the other hand, the center of knowledge production
is related to evaluation of data that is precise and produce explicit
of knowledge. It takes place using CI tool. The center of actuation
is related to receiving knowledge as well as detection of viral
actions and prioritizing the actions [19]. It is achieved with the
help of prioritizing the actions and using the action queue. The
applications of IoT need an effective architecture that is required
for implementing COIB framework. Hence, it is important to
conduct the process related to IoT layering architecture. It is the
vision for using the process based on large scale. The below figure
demonstrates the complete figure of IoT architecture.
measurements. At first, this goes about as a purpose for the
understanding of the information that is unfit for utilization.
Accordingly, it turns into a very difficult circumstance at whatever
point information of high caliber is to be extricated from a big
measure of gathered information.
The concern in regards to the security keeps on upsetting the
clients who are related with the move of private information from
one area to the distributed storage. Related with the enormous
information mining and examination advancement, the earnestness
of the worry is additionally expanding. There exists a need of
individual data keeping in mind the end goal to deliver comes
about, which are applicable, and this may incorporate
administrations, which are customized and depend on areas.
Legitimate issues exists distinctive laws and directions in various
nations to achieve the security and insurance of the information.
There are numerous nations where it is not permitted to screen the
correspondence of organization staff. IoT likewise has some
protestors who trust that it would disregard Privacy and security or
the living being through broad reconnaissance. Nonetheless, the
essential focal point of the Internet Society is just to develop
associations amongst individuals and foundations in their social,
individual, and monetary lives. The blast of IoT would change the
way clients draw in and trade information. It would have an
alternate impact in the different nations and districts, bringing
about a worldwide pool of difficulties and openings.
Through making connection between a few devices to a system
and empowering information social occasion and investigation,
Internet of things is required adding to make client esteem.
Subsequently, a foundation influences lives of individuals and
monetary exercises turn into a region where IoT is used. In this
point of view, safety efforts for IoT framework are imperative to
be considered. On opposite, an emotional increment in the quantity
of connected devices can make specialized issues like assaults with
more extensive extent of impact alongside assaults.
These gateways play out a few basic capacities, for example,
interpretation of conventions, availability of devices, refreshes,
administration, security, and substantially more, they go about as a
hindrance that confines the stream of immaterial data to and from
the IoT devices [15]. The limited data stream makes the framework
secure and diminishes the danger of system interruptions and data
taking. They utilize different models of administration and
security. It is therefore; the proposal paper centers around the
different door based alleviation measures to deal with the security
and Privacy issues of the IoT organize devices.
12. Methodology
The future experiments regarding IoT Security and Privacy
Regime/challenges in all domains of IoT can be conducted by
using the COIB framework. In order to implement the particular
framework, it is important to note down that the IoT environment
includes high internet connectivity as well as environments with
high internet connectivity along with IoT objects connected to the
particular network. It is achieved in order to ensure that existing
regulation of the functional and operational efficiencies can be
achieved effectively [16]. It assists to minimize security issues
along with privacy issues included in all domains of IoT. The
functional aspects of COIB framework can be helpful to minimize
security issues.
The IT environment can be separated into multiple parts and it is
achieved for coping up the several types of standard configuration
related to the management of network. The different sectors of IoT
have responsibility in order to provide IoT raw data streams as well
as related with the major source of raw data for the specific
segments [18]. The sources of IoT do not include any specific
structure and occurs in terms of ‘level’, ‘scale’ and ‘abstraction’. It
ensures that there is existence of high rate of inconsistency,
incompleteness as well as redundancy. In this aspect, few standard
data schematics are generally utilized in the process associated
with data fusion. The major cause lying behind the purpose is
elimination of the types of anomalies. In this aspect, the big data
aggregators have responsibility for fusion of data over large data
streams. The standard data schematics are utilized in the procedure
associated with data fusion. The elimination would be helpful in
generating clean data associated with management of total. The
IoT security issues classifiers have been working for splitting clean
data into several clusters that is usually dependent on the type of
aspects mainly consisting of behavior, domains as well as
characteristics.
In addition, the major reason for achieving this is ensuring that the
evaluation of data is not difficult to make the process easy for
understanding and use. Thus, for applying several types of data
involved with IoT, it is required to engage operational, production
and status type of data. In this aspect, the Hbase storage is
responsible to take the responsibility associated with scaling and
storing the clusters of data in several types of storage nodes. In the
system, there is potential set of tables that could act in similar way
[17]. This is achieved in way that the table includes row and
column. In addition, there is a requirement for ensuring the process
and making presence of the components defined as primary key.
The implementation architecture of COID framework can be
described as below.
Figure 1: Implementation architecture [3]
(Source: Kidmose and Pedersen 2016 )
In the above figure, it is seen that it includes data center, which is
responsible for executing the aggregation of data and make the
process of clarifying data along with several operations related to
the storage. On the other hand, the center of knowledge production
is related to evaluation of data that is precise and produce explicit
of knowledge. It takes place using CI tool. The center of actuation
is related to receiving knowledge as well as detection of viral
actions and prioritizing the actions [19]. It is achieved with the
help of prioritizing the actions and using the action queue. The
applications of IoT need an effective architecture that is required
for implementing COIB framework. Hence, it is important to
conduct the process related to IoT layering architecture. It is the
vision for using the process based on large scale. The below figure
demonstrates the complete figure of IoT architecture.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4INTERNET OF THINGS
Figure 2: Overall IoT big data architecture [3]
(Source: Kidmose and Pedersen 2016 )
The above architecture provides knowledge-processing layer,
which is introduced for producing knowledge in effective way with
the use of application layer. In addition, it is important to develop
production of knowledge, effective to use in application layer [23].
The major cause for doing the process is management of several
types of IoT applications. In addition, the IoT network is
responsible for using internet and integration of several types of
IoT devices with various types of intelligent tools. The reason
behind the process of regulating automatic operations is included
in it.
On the other hand, it is related to depicting the framework that
includes N number of IoT devices integrated with IoT big data
system as well as S is related to depicting regulations [20]. It is
taken place under COIB framework. For each of the devices, there
is existence of P number of IoT objects. It is embedded to the
object. The way is capable of sensing data as well as sending a
number of information associated with the events that is able to
relate to several events to COIB framework
13. Benefits and limitations
The benefits and limitations of using several types of
methodologies are used for internet of things.
Benefits
Reducing cost:
The cost is usually needed for using expensive technology that
would be reduced through using the technologies as well as
improves for adopting the technology and implementing in
different sectors.
Availability: The technologies related to internet of things such as
big data and cloud computing are available to every person for
providing services in any of industries and according to the
demands o the users. Thus, updating the technologies can be
achieved on regular basis. In addition, the update is done
automatically and minimizes manual efforts, which are needed.
Scalability: The applications of internet of things are scalable and
include properties like elasticity that can expand to adjust big data
in the system of storage and available for industry when it is need.
Increasing storage capacity: The use of cloud storage can be
increased as per the requirements as well as amount of data that is
required to store [22]. In addition, it is important to store the
system. Storage of big data is achieved with the help of technology
used in it. The technologies have the capacity for increasing
storage as maximum limit.
Detecting fraud: The technologies are generally used as it has the
capability to identify frauds. In addition, the process of elimination
has the risks by taking effective steps. In addition, the technologies
can assist to make plan of the risks that might happen for disasters.
On demand service: The cloud as well as IoT service is used as per
the demands and help in the process of reducing the concerns
associated with physical data storage system. The technologies are
helpful that can provide advantages compared to data storage
systems.
14. Limitations:
IoT and its applications in all domains have several limitations.
These are non-compatible in some of the cases. It is seen that the
technologies are compatible for making the enterprise obtaining
specific advantages.
Possible failure: The technologies are not managed and
maintained that might lead to failure of the particular project. An
expert management as well as maintenance is needed where there
will be any opportunities of failure.
Privacy and security: The major issues related to privacy and
security are considered as major issues that are vital part of the
technologies [21]. In this privacy as well security matters need to
be taken into account as there are several aspects that can lead to
failure of business in the particular industry.
15. Conclusion:
The report concludes that use of internet of things become popular
with its number of applications in several domains. However, its
rapid increase has brought several issues in security and privacy
issues. The privacy concerns are increasing as the number of
devices are staying behind the network or firewall. On the other
hand, as there are several devices associated with the use of
internet of things, there is chances of hacking. Internet of things
and its applications collect data, retrieval and processing as integral
part of the environment,
References
[1] Li, S., Da Xu, L. and Zhao, S., 2015. The internet of things: a
survey. Information Systems Frontiers, 17(2), pp.243-259.
[2] Kumar, S.A., Vealey, T. and Srivastava, H., 2016, January.
Security in internet of things: Challenges, solutions and
future directions. In System Sciences (HICSS), 2016 49th
Hawaii International Conference on (pp. 5772-5781). IEEE.
[3] Kidmose, E. and Pedersen, J.M., 2017. Security in Internet of
Things. Cybersecurity and Privacy-Bridging the Gap, p.99.
[4] Sicari, S., Rizzardi, A., Grieco, L.A. and Coen-Porisini, A.,
2015. Security, privacy and trust in Internet of Things: The
road ahead. Computer networks, 76, pp.146-164.
[5] Da Xu, L., He, W. and Li, S., 2014. Internet of things in
industries: A survey. IEEE Transactions on industrial
informatics, 10(4), pp.2233-2243.
[6] Mosenia, A. and Jha, N.K., 2017. A comprehensive study of
security of internet-of-things. IEEE Transactions on
Emerging Topics in Computing, 5(4), pp.586-602. Aazam,
M. and Huh, E.N., 2015, March. Fog computing micro
datacenter based dynamic resource estimation and pricing
model for IoT. In Advanced Information Networking and
Figure 2: Overall IoT big data architecture [3]
(Source: Kidmose and Pedersen 2016 )
The above architecture provides knowledge-processing layer,
which is introduced for producing knowledge in effective way with
the use of application layer. In addition, it is important to develop
production of knowledge, effective to use in application layer [23].
The major cause for doing the process is management of several
types of IoT applications. In addition, the IoT network is
responsible for using internet and integration of several types of
IoT devices with various types of intelligent tools. The reason
behind the process of regulating automatic operations is included
in it.
On the other hand, it is related to depicting the framework that
includes N number of IoT devices integrated with IoT big data
system as well as S is related to depicting regulations [20]. It is
taken place under COIB framework. For each of the devices, there
is existence of P number of IoT objects. It is embedded to the
object. The way is capable of sensing data as well as sending a
number of information associated with the events that is able to
relate to several events to COIB framework
13. Benefits and limitations
The benefits and limitations of using several types of
methodologies are used for internet of things.
Benefits
Reducing cost:
The cost is usually needed for using expensive technology that
would be reduced through using the technologies as well as
improves for adopting the technology and implementing in
different sectors.
Availability: The technologies related to internet of things such as
big data and cloud computing are available to every person for
providing services in any of industries and according to the
demands o the users. Thus, updating the technologies can be
achieved on regular basis. In addition, the update is done
automatically and minimizes manual efforts, which are needed.
Scalability: The applications of internet of things are scalable and
include properties like elasticity that can expand to adjust big data
in the system of storage and available for industry when it is need.
Increasing storage capacity: The use of cloud storage can be
increased as per the requirements as well as amount of data that is
required to store [22]. In addition, it is important to store the
system. Storage of big data is achieved with the help of technology
used in it. The technologies have the capacity for increasing
storage as maximum limit.
Detecting fraud: The technologies are generally used as it has the
capability to identify frauds. In addition, the process of elimination
has the risks by taking effective steps. In addition, the technologies
can assist to make plan of the risks that might happen for disasters.
On demand service: The cloud as well as IoT service is used as per
the demands and help in the process of reducing the concerns
associated with physical data storage system. The technologies are
helpful that can provide advantages compared to data storage
systems.
14. Limitations:
IoT and its applications in all domains have several limitations.
These are non-compatible in some of the cases. It is seen that the
technologies are compatible for making the enterprise obtaining
specific advantages.
Possible failure: The technologies are not managed and
maintained that might lead to failure of the particular project. An
expert management as well as maintenance is needed where there
will be any opportunities of failure.
Privacy and security: The major issues related to privacy and
security are considered as major issues that are vital part of the
technologies [21]. In this privacy as well security matters need to
be taken into account as there are several aspects that can lead to
failure of business in the particular industry.
15. Conclusion:
The report concludes that use of internet of things become popular
with its number of applications in several domains. However, its
rapid increase has brought several issues in security and privacy
issues. The privacy concerns are increasing as the number of
devices are staying behind the network or firewall. On the other
hand, as there are several devices associated with the use of
internet of things, there is chances of hacking. Internet of things
and its applications collect data, retrieval and processing as integral
part of the environment,
References
[1] Li, S., Da Xu, L. and Zhao, S., 2015. The internet of things: a
survey. Information Systems Frontiers, 17(2), pp.243-259.
[2] Kumar, S.A., Vealey, T. and Srivastava, H., 2016, January.
Security in internet of things: Challenges, solutions and
future directions. In System Sciences (HICSS), 2016 49th
Hawaii International Conference on (pp. 5772-5781). IEEE.
[3] Kidmose, E. and Pedersen, J.M., 2017. Security in Internet of
Things. Cybersecurity and Privacy-Bridging the Gap, p.99.
[4] Sicari, S., Rizzardi, A., Grieco, L.A. and Coen-Porisini, A.,
2015. Security, privacy and trust in Internet of Things: The
road ahead. Computer networks, 76, pp.146-164.
[5] Da Xu, L., He, W. and Li, S., 2014. Internet of things in
industries: A survey. IEEE Transactions on industrial
informatics, 10(4), pp.2233-2243.
[6] Mosenia, A. and Jha, N.K., 2017. A comprehensive study of
security of internet-of-things. IEEE Transactions on
Emerging Topics in Computing, 5(4), pp.586-602. Aazam,
M. and Huh, E.N., 2015, March. Fog computing micro
datacenter based dynamic resource estimation and pricing
model for IoT. In Advanced Information Networking and
5INTERNET OF THINGS
Applications (AINA), 2015 IEEE 29th International
Conference on (pp. 687-694). IEEE.
[7] Aazam, M., St-Hilaire, M., Lung, C.H. and Lambadaris, I.,
2016, January. PRE-Fog: IoT trace based probabilistic
resource estimation at fog. In Consumer Communications &
Networking Conference (CCNC), 2016 13th IEEE
Annual (pp. 12-17). IEEE.
[8] Aazam, M., St-Hilaire, M., Lung, C.H., Lambadaris, I. and
Huh, E.N., 2017. IoT Resource Estimation Challenges and
Modeling in Fog. In Fog Computing in the Internet of
Things (pp. 17-31). Springer International Publishing.
[9] Aazam, M., Huh, E.N. and St-Hilaire, M., 2016. Towards
Media Inter-cloud Standardization–Evaluating Impact of
Cloud Storage Heterogeneity. Journal of Grid Computing,
pp.1-19.
[10] Abdmeziem, M.R., Tandjaoui, D. and Romdhani, I., 2016.
Architecting the internet of things: state of the art. In Robots
and Sensor Clouds (pp. 55-75). Springer International
Publishing.
[11] Ahmed, E.S.A. and Saeed, R.A., 2014. Review of Gateway
Selection Schemes for MANET to Internet
Connectivity. International Journal of Computer Science and
Telecommunications (IJCST), 5(11), pp.17-23.
[12] Bauer, G.R., 2014. Incorporating intersectionality theory into
population health research methodology: challenges and the
potential to advance health equity. Social Science &
Medicine, 110, pp.10-17.
[13] Beckman, L.J., 2014. Training in feminist research
methodology: Doing research on the margins. Women &
Therapy, 37(1-2), pp.164-177.
[14] Al Mamoon, I., Islam, A.M. and Baharun, S., 2015. VoIP
Based Tele-medicine Call Center–Issues, Challenges and
Proposed Solution.
[15] Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M.
and Ayyash, M., 2015. Internet of things: A survey on
enabling technologies, protocols, and applications. IEEE
Communications Surveys & Tutori Dsouza, C., 2015. Policy-
driven Security Management for Gateway-Oriented
Reconfigurable Ecosystems. Arizona State University.
als, 17(4), pp.2347-2376.
[16] Amin, R. and Biswas, G.P., 2016. A secure light weight
scheme for user authentication and key agreement in multi-
gateway based wireless sensor networks. Ad Hoc
Networks, 36, pp.58-80.
[17] Ashraf, Q.M., Habaebi, M.H., Sinniah, G.R. and Chebil, J.,
2014. Broadcast based registration technique for
heterogenous nodes in the IoT. In International Conference
on Control, Engineering, and Information Technology (CEIT
2014), Sousse.
[18] Azhdarzadeh, M., Saei, A.A., Sharifi, S., Hajipour, M.J.,
Alkilany, A.M., Sharifzadeh, M., Ramazani, F., Laurent, S.,
Mashaghi, A. and Mahmoudi, M., 2015. Nanotoxicology:
advances and pitfalls in research
methodology. Nanomedicine, 10(18), pp.2931-2952.
[19] Baedeker, C., Greiff, K., Grinewitschus, V., Hasselkuß, M.,
Keyson, D., Knutsson, J., Liedtke, C., Lockton, D., Lovric,
T., Morrison, G. and van Rijn, M., 2014, August. Transition
through sustainable Product and Service Innovations in
Sustainable Living Labs: application of user-centred research
methodology within four Living Labs in Northern Europe.
In 5th International Sustainable Transitions (IST)
Conference (pp. 27-29).
[20] Bali, R.S., Kumar, N. and Rodrigues, J.J., 2014. Clustering in
vehicular ad hoc networks: taxonomy, challenges and
solutions. Vehicular communications, 1(3), pp.134-152
[21] Ali, M., Bilal, H.S.M., Razzaq, M.A., Khan, J., Lee, S., Idris,
M., Aazam, M., Choi, T., Han, S.C. and Kang, B.H., 2017.
IoTFLiP: IoT-based Flip Learning Platform for Medical
Education. Digital Communications and Networks.
[22] Al-Kaseem, B.R. and Al-Raweshidy, H.S., 2016, September.
Enabling wireless Software Defined Networking in cloud
based Machine-to-Machine gateway. Kim, H. and Feamster,
N., 2013. Improving network management with software
defined networking. IEEE Communications Magazine, 51(2),
pp.114-119. 24-29). IEEE.
[23] Alsmirat, M.A., Jararweh, Y., Obaidat, I. and Gupta,
B.B., 2017. Internet of surveillance: a cloud supported large-
scale wireless surveillance system. The Journal of
Supercomputing, 73(3), pp.973-992.
Applications (AINA), 2015 IEEE 29th International
Conference on (pp. 687-694). IEEE.
[7] Aazam, M., St-Hilaire, M., Lung, C.H. and Lambadaris, I.,
2016, January. PRE-Fog: IoT trace based probabilistic
resource estimation at fog. In Consumer Communications &
Networking Conference (CCNC), 2016 13th IEEE
Annual (pp. 12-17). IEEE.
[8] Aazam, M., St-Hilaire, M., Lung, C.H., Lambadaris, I. and
Huh, E.N., 2017. IoT Resource Estimation Challenges and
Modeling in Fog. In Fog Computing in the Internet of
Things (pp. 17-31). Springer International Publishing.
[9] Aazam, M., Huh, E.N. and St-Hilaire, M., 2016. Towards
Media Inter-cloud Standardization–Evaluating Impact of
Cloud Storage Heterogeneity. Journal of Grid Computing,
pp.1-19.
[10] Abdmeziem, M.R., Tandjaoui, D. and Romdhani, I., 2016.
Architecting the internet of things: state of the art. In Robots
and Sensor Clouds (pp. 55-75). Springer International
Publishing.
[11] Ahmed, E.S.A. and Saeed, R.A., 2014. Review of Gateway
Selection Schemes for MANET to Internet
Connectivity. International Journal of Computer Science and
Telecommunications (IJCST), 5(11), pp.17-23.
[12] Bauer, G.R., 2014. Incorporating intersectionality theory into
population health research methodology: challenges and the
potential to advance health equity. Social Science &
Medicine, 110, pp.10-17.
[13] Beckman, L.J., 2014. Training in feminist research
methodology: Doing research on the margins. Women &
Therapy, 37(1-2), pp.164-177.
[14] Al Mamoon, I., Islam, A.M. and Baharun, S., 2015. VoIP
Based Tele-medicine Call Center–Issues, Challenges and
Proposed Solution.
[15] Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M.
and Ayyash, M., 2015. Internet of things: A survey on
enabling technologies, protocols, and applications. IEEE
Communications Surveys & Tutori Dsouza, C., 2015. Policy-
driven Security Management for Gateway-Oriented
Reconfigurable Ecosystems. Arizona State University.
als, 17(4), pp.2347-2376.
[16] Amin, R. and Biswas, G.P., 2016. A secure light weight
scheme for user authentication and key agreement in multi-
gateway based wireless sensor networks. Ad Hoc
Networks, 36, pp.58-80.
[17] Ashraf, Q.M., Habaebi, M.H., Sinniah, G.R. and Chebil, J.,
2014. Broadcast based registration technique for
heterogenous nodes in the IoT. In International Conference
on Control, Engineering, and Information Technology (CEIT
2014), Sousse.
[18] Azhdarzadeh, M., Saei, A.A., Sharifi, S., Hajipour, M.J.,
Alkilany, A.M., Sharifzadeh, M., Ramazani, F., Laurent, S.,
Mashaghi, A. and Mahmoudi, M., 2015. Nanotoxicology:
advances and pitfalls in research
methodology. Nanomedicine, 10(18), pp.2931-2952.
[19] Baedeker, C., Greiff, K., Grinewitschus, V., Hasselkuß, M.,
Keyson, D., Knutsson, J., Liedtke, C., Lockton, D., Lovric,
T., Morrison, G. and van Rijn, M., 2014, August. Transition
through sustainable Product and Service Innovations in
Sustainable Living Labs: application of user-centred research
methodology within four Living Labs in Northern Europe.
In 5th International Sustainable Transitions (IST)
Conference (pp. 27-29).
[20] Bali, R.S., Kumar, N. and Rodrigues, J.J., 2014. Clustering in
vehicular ad hoc networks: taxonomy, challenges and
solutions. Vehicular communications, 1(3), pp.134-152
[21] Ali, M., Bilal, H.S.M., Razzaq, M.A., Khan, J., Lee, S., Idris,
M., Aazam, M., Choi, T., Han, S.C. and Kang, B.H., 2017.
IoTFLiP: IoT-based Flip Learning Platform for Medical
Education. Digital Communications and Networks.
[22] Al-Kaseem, B.R. and Al-Raweshidy, H.S., 2016, September.
Enabling wireless Software Defined Networking in cloud
based Machine-to-Machine gateway. Kim, H. and Feamster,
N., 2013. Improving network management with software
defined networking. IEEE Communications Magazine, 51(2),
pp.114-119. 24-29). IEEE.
[23] Alsmirat, M.A., Jararweh, Y., Obaidat, I. and Gupta,
B.B., 2017. Internet of surveillance: a cloud supported large-
scale wireless surveillance system. The Journal of
Supercomputing, 73(3), pp.973-992.
1 out of 6
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.