Security and Privacy issues in IoT enabled Smart Cities
Verified
Added on  2022/11/28
|23
|6142
|87
AI Summary
This research paper discusses the security and privacy issues in IoT enabled Smart Cities. It explores the challenges, vulnerabilities, and techniques to mitigate the risks. The paper also highlights the advantages of using IoT technology in Smart Cities.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: RESEARCH PAPER RESEARCH PAPER: Security and Privacy issues in IoT enabled Smart Cities [Name of the Student] [Name of the University] [Author note]
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1RESEARCH PAPER Table of Contents Introduction:....................................................................................................................................3 Research significance:.....................................................................................................3 Research Aim:.................................................................................................................5 Research Questions:.........................................................................................................5 Research objectives:........................................................................................................5 Research Background:.....................................................................................................................6 Type of security and privacy challenges:........................................................................6 Security vulnerabilities and issues in IoT enabled Smart Cities:....................................7 Presence of constrained devices at the perception layer:.............................................7 Weak encryption:.........................................................................................................8 The integration layers communication technologies:..................................................8 Cloud Layer.................................................................................................................9 Cascade effect and the complexity of the system:.......................................................9 Software bugs:...........................................................................................................10 Equipment of the User:..............................................................................................11 Human factors:...........................................................................................................11 Legacy Systems:........................................................................................................11 Aim and Significance:...............................................................................................12 Research plan:................................................................................................................................12
2RESEARCH PAPER Outline of the Research:................................................................................................12 Research Philosophy:.....................................................................................................13 Approach of the Research..............................................................................................13 Research Design............................................................................................................14 Data Collection procedure.............................................................................................14 Sampling:.......................................................................................................................15 Data Analysis Method...................................................................................................16 Expected Results............................................................................................................16 Schedule:........................................................................................................................16 Gantt chart:....................................................................................................................17 Conclusion:....................................................................................................................................18 References:....................................................................................................................................19
3RESEARCH PAPER Introduction: The implementation of eth Internet of Things device re associated with making the cities get smarter. Smart cities are generally considered to be the communities which are associated with building of infrastructures in a continuous way so as to improve the collection, aggregation and use of the data(Amendola et al. 2014). This is donefor the purpose of improving the lives of the residents by means of harnessing the growing data revolution along with the sensors which are low of cost and the collaborations in the research which is mainly done with an aim of securing and protecting the public safety as well as individual privacy. Practically it can be stated that the cities are associated with the usage of low-cost sensors along with Wi-Fi enabled smart devices for the purpose of talking to the people and cities. These IoT devices are also associated with providing the local leaders with a real-time data related to the needs of the communication(Centenaro et al. 2016. In addition to this the city managers are associated with the usage of the information from the IoT devices for the purpose of creating transformational solutions for managing the cities which are crowded in a more manageable and affordable way for everyone. Research significance: The smart city infrastructure associated with the IoT technology is also associated with enabling of a more efficient as well as health boosting services for the city. IoT in smart cities are associated with performing by usage of different kind of applications which are associated with enabling of video surveillance, smart meters, smart parking spaces, intelligent waste management along with environmental sensing functions and many more(Chen et al. 2014). Experts have been associated with noting the fact that the modular end-to-end IoT solutions
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4RESEARCH PAPER provided for the smart cities are associated with including the analytic modules along with electronic security and hosting of devices, systems and sub systems. These can as well be harnessed into the implementation of an infrastructure which along with being fully shared would be fully secured as well as scalable. In addition to all this the emergence of the digital technologies have been associated with helping the developers of the smart cities in managing the urban waste along with improving the quality of water for the residents, easing of the congestions in the traffics, cutting down of the pollution levels in the urban landscape, making sure of the safety of public, improving the public good delivery along with securing a range of public assets as well as infrastructure(Chiang and Zhang 2016). This might be associated with including the Bluetooth Low energy, 5G technology, big data, artificial intelligence, machine learning platforms and many more. These type of technologies when gets incorporated with the IoT infrastructure are associated with elevating the experience of human beings in the smart city solutions(Farooq et al. 2015). However the designers of the smart cities should necessarily be associated with remaining consistent along with an avowed strategy across different initiatives and must be associated with reaping down of the short-term benefits in the process of implementation. The adaptation of the IoT is being done at a rapid speed and millions of sensors and smart devices are getting connected to the network and are being deployed on a daily basis in offices, home,citiesandalsoforotherpurposeswhichareresponsibleforthecreationofan unprecedented opportunities related to cutting down of the costs, reducing the consumption of energy, improving the efficiency and customer services(Gubbi et al. 2013). This helps in understanding the ways of interacting with the environment in a better way. However this type of
5RESEARCH PAPER added utility is associated with its own set of caveats as well as requirements and all this needs to be addressed by adaptation of a proper solution or approach. Research Aim: One of the major aspect of the smart cities is associated with including the security. Smart cities are associated with relying upon the constant connectivity to the volume of data which are received from the stationary as well as from the moving sensor. Once the data are received they are converted into useful information by making use of the data analytics so as to provide a life of better quality(He, Yan and Da Xu 2014). Failure in securing the data and when the data gets into the wrong hands then it can cause extreme damage and might be associated with leading to catastrophic events. Concerns would no longer be considered to be limited to the protection of the sensitive information and assets. This research would entirely be aimed at the IoT in smart cities security. Research Questions: Q1. What are the major security risks that are faced by the IoT enabled Smart cities? Q2. What are the techniques by which the risks can be mitigated? Q3. What are the major components responsible for putting forward of the security issues? Q4. What are the major advantages of using the IoT technology in the Smart cities? Research objectives: The objectives of the research have been listed below: ď‚·To understand the major security challenges faced by the IoT enabled smart cities
6RESEARCH PAPER ď‚·To understand the techniques used for eliminating or mitigating the security issues ď‚·To identify the major reason laying the being the security issues ď‚·To understand the advantages of IoT technology in the smart cities. Research Background: Smart cities cannot be considered to be smart unless and until these are capable of providing the required level of security. General security and privacy of the requirements is associated with including of making sure that the availability, integrity along with access control, confidentiality and the nonrepudiation. The smart cities are associated with harnessing of the data which are sensed from the physical spaces which are seen to be associated with containing the granular details related to the people who are living in this environments(Huh, Cho and Kim 2017). The journey of the data is seen to be starting from the sensor nodes and generally ends up at the user application. For this reason the smart city is seen to be posing an unique security requirements and the reason behind this is that the systems consists of interlinked systems which are associated with sharing of data with one another. This is the key argument which is responsible for discouraging the wide spread usage of the smart city services. Type of security and privacy challenges: The security requirements of the IoT enabled smart cities can be categorized into two different categories. The operational security requirements is associated with ensuring the fact that the technology and the infrastructure which has been employed is secure along with being immune to any type of cyber-attacks(Kelly, Suryadevara and Mukhopadhyay 2013). The second aspect of the security is associated with dealing with the data which are generated and are communicated within the infrastructure which are associated with the usage of different kind of technologies. Despite of all this the data security along with the protection is seen to be
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7RESEARCH PAPER dependent upon the operational security as anyone who would be breaking into the system would become capable of violating the data access policy. Security vulnerabilities and issues in IoT enabled Smart Cities: The system security vulnerability is associated with defining the security holes which can because of the numerous issues which includes the weak encryption, human errors and many more(Khan and Salah 2018). This type of issues faced by the smart cities are generally seen to be aggravated by the sensors which are physical dispersed in the public spaces as well as by the multifold complexities existing in the system and the interdependencies which exists between its componentswhich is associated with making it more vulnerable to different kind of cyber- attacks. Below are the listed some of the major security issues faced by the IoT Smart cities. Presence of constrained devices at the perception layer: Internet of things is associated with connecting all the RFID tags along with the sensor devices to the internet. RFID dependent objects are generally considered to be passive and the reason behind this is that they generally requires a reader along with a gateway so as to get connected to the internet for example the smart cards which are used by the transport systems. Contrarily the sensor devices are associated with including sensors along with actuators and microcontrollers(Kolias et al. 2017). In today’s world there exists different kind of sensors which are capable sensing the diverse phenomenon like the humidity, velocity, location and many more. In addition to this the traditional dumb devices such as the electronic devices along with the doors and lights are associated with notifying and are being remotely controlled by the users. Moreover these sensor devices ate constrained in the resources and are seen to be lacking an efficient security or privacy mechanism. This in turn is associated with making the devices
8RESEARCH PAPER prone to the risk of being hacked and is associated with opening up of ports for different kind of security risks. Weak encryption: Encryption is considered to be traditional way for securing the networked software devices and it is generally believed that the encrypted channels ate associated with making sure of the fact that the system is protected against the attackers. Besides this the current smart city initiatives are associated with deployment of systems without conducting any kind of tests related to the cyber-security threats(Lazarescu 2013). Despite of all this it is very important aspect which the IoT enabled Smart cities are having where most of the IoT devices are having constraints and are not capable of supporting the viable links which are encrypted. Moreover the encrypted links are also prone to the other security issues and the reason behind this is that the attackers are still capable of breaking into the encrypted systems by making use of the side channels as well as by making use of the clod boot attacks. This issues are generally associated with acting as one of the major hurdle in the way of wide acceptance of the smart city systems. The integration layers communication technologies: There exists different kind of communication technologies which are seen to be used by the various kind of IoT devices and this depends upon their capabilities. This technologies are mainly associated with including the RFID, Bluetooth NFC, ZigBee, BLE and 6LoWPAN which is based upon the IEEE802.15.4, Wi-Fi, LPWAN, and the 3G & 4G mobile technologies(Lee and Lee 2015). All these technologies are seen to be having security vulnerabilities which are associated with making them susceptible to being hijacked. Moreover the most sophisticated technologies for example the 4G mobile technologies are seen to be having vulnerabilities associated with its infrastructure.
9RESEARCH PAPER Cloud Layer The cloud layer is generally associated with providing of the required flexibility for the purpose of supporting the scalability feature of the smart cities, but the cloud systems are seen to be having security issues like the outsourcing, multi-tenancy and along with this the massive data which is seen to be associated with requiring intense computation. Outsourcing is also seen to be requiring the need of providing remote access which is associated with resulting in having a less control upon the data and is eventually responsible for causing insecurity as well as privacy violations. It is possible to deal with this by making sure of the fact that the cloud provider is trust worthy along with making sure that the data which is outsourced is verifiable in terms of the security and privacy(Madakam, Ramaswamy and Tripathi 2015). Multi-tenancy is associated with enabling of the multiple users for the purpose of using the cloud platforms. The clouds ate also capable of using the different allocation of the resource policies for storing the data of different users in a single physical machine, for this reason the multi-tenancy is associated with posing various kind of security vulnerabilities. Another major aspect of the cloud computing is associated with including the traditional security techniques and this is generally seen to be requiring heavy communication or computing overheads for the purpose of dealing with the massive amount of data in the clouds. The overhead is seen to be becoming infeasible for example in cases related to the hashing of the entire data set which is stored remotely. Cascade effect and the complexity of the system: The systems existing the smart cities are of large scale and are seen to be complex which is seen to be associated with containing heterogeneous networks along with devices. The smart city architectures ate seen to be consisting of multiple layers and each of the layer is seen to be consistingofplethoraofdevicesaswellastechnologies.Besidesthisthewebof
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10RESEARCH PAPER interdependencies which are seen to be existing between its components as well as with the other systems as associated with posing a huge challenge for the measures as well as the for the mitigation processes of the risks in the presence of numerous stakeholders(Tao et al. 2014). Besides this the multiple links which are seen to eb existing between the system components are associated with exposing them to the security risks even if all the systems are secured in an independent way, in addition to this the interdependencies are also seen to be turning out as a major issue in the process of maintaining or upgrading the interface of the components of the system. Moreover the highly interconnected components are also seen to be probe to the creation of the cascade effects where one attack on a system is associated with having a severe affect upon the other systems as well. Thus security risks are in turn associated with posing a huge challenge in the realization of the smart city where one of the successful attacks is capable of down the entire system of the smart city management. Software bugs: Along with the above stated security risks the devices which are software based might also become vulnerable to the cyber-attacks and the main reason behind this is the existence of the software bugs which are associated with leaving a hole for the attackers to sneak into the system, this particular factor is further associated with getting intensified in the complex systems which are seen to consisting of millions of lines of code(Tukker et al. 2013). This is the particular space where the bugs are associated with opening up of backdoors for the attackers. Once the attacker archives success in getting into the system of the smart cities then the attacker would be gaining an entirecontrol over the systemsand would be associatedwith the exploitation of the data which are available.
11RESEARCH PAPER Equipment of the User: Numerous users existing in the smart cities are capable of consuming the value added services and participate in the crowd sensing by making use of their mobile devices which are seen to be prone to different kind of the vulnerabilities. At first each of the mobile phone are capable of being identified by making use of the unique IMEI code. This IEMI codes are generally related to the owner of the phone so as to get their personal information and can also be used for the purpose of tracking the mobile device as well(Wang et al. 2016). In addition to this there exists many users who are seen to be having a reckless behaviors towards providing of permission access to the malicious applications. And once these malicious applications gets the permission they would become capable of accessing the information of the user along with gaining a control over the device. Human factors: The IoT enabled smart cities are hardly allowed to fully operate in an autonomous way and the main reason behind this is that if they are fully allowed to operate in an autonomous way then they would be associated with the creation of a Kafkaesque situation. For this reason the humans are almost always kept in a loop of decision making along with some their interactions conducted with the smart city systems(Zhang et al. 2014). The errors conducted by humans either in a deliberate way or by mistake would be resulting in the leakage of the data or malfunctioning of the entire system. There exists numerous way by which the users of the smart city can sabotage the entire system. Legacy Systems: The legacy systems are seen to be existing everywhere and most of the authorities are seen to be requiring the integration of the infrastructure which is already existing with the smart
12RESEARCH PAPER city infrastructure. Most of the legacy systems are seen to be insecure and have been created almost decades ago without taking into consideration the account of the security challenges existing in today’s world(Xu, Wendt and Potkonjak 2014). These type of legacy systems are not upgraded on a regular basis and have been associated with inheriting the vulnerabilities which in turn is responsible for providing of a freeway for the attackers. Besides this it is also very essential to make sure that the new smart city systems are regularly being patched up with the new security features. Aim and Significance: The main aim of this paper is to analyze the different kind of threats and security issues which are associated with the IoT enabled Smart cities along with understanding the ways how the security issues can be minimized. The entire research when completed would be helping in understanding the different kind of security threats which are faced by the IoT enabled smart cities(Zhao and Ge 2013). The research would also be helping in investigating the various type of advantages which are put forward because of using the IoT by the smart cities. In addition to this all the challenges which are faced by the organizations would also be analyzed in a proper way. The research would also be helping in recommending certain precautions which are necessary for eliminating or minimizing the security challenges as well. Research plan: Outline of the Research: The research study will be conducted based on the previous literature review in the area of the cloud computing uses and the current data. The philosophy that will be used in the research study is the positivism philosophy. Both the social and scientific data will be considered
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
13RESEARCH PAPER to understand the present condition of the cloud computing uses in the business organizations. Deductive approach will be used in the study as the research approach and the analytical design will be used as the research design of this study(Vermaet al.2017). Primary and secondary both of these two types of data will be used in this research work. In the primary data, both the quantitative and qualitative data will be collected and analyzed. Research Philosophy: There are two types of research philosophy namely, positivism and interpretivism. The interpretivism philosophy deals with conducting the research analysis by following scientific data only. In this particular philosophy human involvement associated with the research is not defined or described. There are two different types of research methods are found to be exceptionally prominent to lead scholastic research study. The positivism investigation theory incorporates viewing as well as perceiving certified affirmations as well as clarifications and thus separates the enquiry problems related with them(Lee, Choi and Kim 2017). The researcher achieved positivism by appraising the available information as well as break down examination problems which is indicated by truths, verification recorded and bona fide realities. The interpretivism theory is similar to positivism as it draws the problems in people’s own perception as well as determinations on the specific scene or condition. This operation will be operated considering the positivism where logical methods will be used as part of social research. Approachof the Research Two important research approaches were used for composition works, they are inductive and deductive. The deductive approach is the important approach in research go as it achieves
14RESEARCH PAPER profits many information utilizing the top-base approach as well as involves someone to review flow composing(Alansariet al.2018). The inductive approach is superior approach used in the research works. Here, innovative theories and layout are developed. It enhances the examinations in the fundamental period of investigation with the specific objective of incrementing the sensitiveinformation.Therequirementsdevelopimperativetheorysuchthattheother speculation is enhanced. In this situation, the deductive approach is applicable where the different truths and implementation of concerned technology as well as their related problems will be found. In this research, the project members will not develop new layout or theories. Research Design There are three different sorts of designs for research work, they are descriptive, exploratory and explanatory research designs. The exploratory design deals with engaging researcherinthecreationofinformationof thetopic.Expressiveoutlineisoneof the predominantframeworksincasewhenresearchobjectivesareclearlyunderstoodatthe beginning of the research. The insights and the occurrence of issues are clearly understood in the beginning of research work(Kumar 2019). On the other hand some other peoples recommend spellbinding outline to finish the research work. In this particular case, researcher will use descriptive research design which use some existing theories and literature to conduct the research analysis. Data Collectionprocedure Data can be classified as two types primary as well as secondary. Information will play an important role in completing the project. The data can be collected from the people,
15RESEARCH PAPER examination region or from other sources(Silverman 2016)). Auxiliary data can be defined as the data that are collected from diaries, yearly reports or newspaper(Flick 2015). In this particular project plan, the required information will be collected to satisfy the objective of the research. Information can be divided in two various forms depending on the form of the accessibility, they are quantitative and subjective information. In this particular case, the primary data will be gathered from peoples who are related to the business organization which utilizes the different IoT devices. Two types of data are required for the research namely, quantitative and qualitative. The quantitative data are gathered by survey that are to be answered or responded by the people of the organization who are using IoT in their organization(Bresler and Stake 2017). Some information will be collected from the meeting that will be held between the operational executive and the IT chiefs associated with the business. Sampling: Itisatechniqueofselectinganobjectivetogatherthedatausedforresearch contemplates. The inspecting methods can be of two different types, namely, likelihood testing techniqueandnon-likelihoodresearchtechnique(Fletcher2017).Inlikelihoodresearch technique everyone achieves a same level of requirements that is to be chosen. Objective populace can be chosen in various ways but in this case the analyst technique will be used to determine the objective populace. In this research, the researcher will use both the sampling techniques.In likelihood research technique arbitrary determination method will used to choose the objective populace and non-likelihood technique will be utilized to choose the chiefs for meeting(Walliman 2017).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
16RESEARCH PAPER Specialist will choose the administrators depending on the experience and various skills of leading a discussion. Data Analysis Method The research will be completed by the qualitative and quantitative data that are collected in the data collected method. Data that are gathered form the surveys or the meeting will be critically analyzed and will be deeply compared with the data that are collected from literary sources. The conclusion of the interviews or the results will also be analyzed and then researcher will locate that the research objective is met or not(McCusker and Gunaydin 2015). The quantitative data will be analyzed using the Microsoft Excel software which help the researcher to locate the differences between the qualitative and quantitative data. Expected Results Theexpectedresultsofthisresearchdealswiththevariousissuesfacedby the organizations which uses IoT devices in their organization to control various business operations (Brannen 2017). The literature of research will enhance the understanding of the possible threats related to the IoT technology and the data analysis method will enhance the understanding of present situation of the research work. The outcomes of the research will help to make the city smarter by implementing IoT devices Schedule: Task ModeTask NameDurationStartFinishPredecessors Auto Schedu led Research Project36 monsMon 5/27/19 Fri 2/25/22 Auto Schedu led Research Proposal16.15 mons Mon 5/27/19 Wed 8/19/20 AutoChoosing a topic for research10 daysMonFri 6/7/19
17RESEARCH PAPER Schedul ed5/27/19 Auto Schedul ed Background Study of the Research120 daysMon 6/10/19 Fri 11/22/193 Auto Schedul ed Development of the Research Question20 daysMon 11/25/19 Fri 12/20/194 Auto Schedul ed Designing the Conceptual Framework150 daysMon 12/23/19 Fri 7/17/205 Auto Schedul ed Development of the Research Question20 daysMon 7/20/20 Fri 8/14/206 Auto Schedul ed Research Proposal Submission3 daysMon 8/17/20 Wed 8/19/207 Auto Schedu led Review of the Literature and Collection of the Data 8.35 mons Thu 8/20/20 Fri 4/9/21 Auto Schedul ed Reviewing the available literature2 monsThu 8/20/20 Wed 10/14/208 Auto Schedul ed Selecting target population for collecting the data80 daysThu 10/15/20 Wed 2/3/2110 Auto Schedul ed Collecting the Data of the Research Study15 daysThu 2/4/21 Wed 2/24/2111 Auto Schedul ed Analysing the gathered data30 daysThu 2/25/21 Wed 4/7/2112 Auto Schedul ed Submission of the Draft Research paper2 daysThu 4/8/21Fri 4/9/2113 Auto Schedu led Submission of the Final Project Paper 11.5 mons Mon 4/12/21 Fri 2/25/22 Auto Schedul ed Critical Analysis of the findings150 daysMon 4/12/21 Fri 11/5/2114 Auto Schedul ed Concluding the Findings of the Study60 daysMon 11/8/21 Fri 1/28/2216 Auto Schedul ed Recommendations20 daysMon 1/31/22 Fri 2/25/2217
18RESEARCH PAPER Auto Schedul ed Submitting the Final Project Report0 daysFri 2/25/22 Fri 2/25/2218 Gantt chart: Conclusion: Smart cities are considered to be complex system which are seen to be consisting of heterogeneous devices which are associated with communicating amongst themselves by making use of a plethora of communications. This devices along with the protocols are seen to be vulnerable to various kind of security as well as privacy issues. This paper is entirely associated with discussing about the smart city architecture along with the different kind of applications as well, however the paper is mainly associated with highlighting the major security and privacy issues of the IoT enabled Smart cities. The entire research is conducted for understanding this issues so as to identify the major ways by which this issues can be eliminated or mitigated.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
19RESEARCH PAPER References: Alansari, Z., Soomro, S., Belgaum, M.R. and Shamshirband, S., 2018. The rise of Internet of Things (IoT) in big healthcare data: review and open research issues. InProgress in Advanced Computing and Intelligent Engineering(pp. 675-685). Springer, Singapore. Amendola, S., Lodato, R., Manzari, S., Occhiuzzi, C. and Marrocco, G., 2014. RFID technology for IoT-based personal healthcare in smart spaces.IEEE Internet of things journal,1(2), pp.144- 152. Brannen, J., 2017.Mixing methods: Qualitative and quantitative research. Routledge. Bresler, L. and Stake, R.E., 2017. Qualitative research methodology in music education. InCritical Essays in Music Education(pp. 113-128). Routledge. Centenaro, M., Vangelista, L., Zanella, A. and Zorzi, M., 2016. Long-range communications in unlicensedbands:TherisingstarsintheIoTandsmartcityscenarios.IEEEWireless Communications,23(5), pp.60-67. Chen, S., Xu, H., Liu, D., Hu, B. and Wang, H., 2014. A vision of IoT: Applications, challenges, and opportunities with china perspective.IEEE Internet of Things journal,1(4), pp.349-359. Chiang, M. and Zhang, T., 2016. Fog and IoT: An overview of research opportunities.IEEE Internet of Things Journal,3(6), pp.854-864. Farooq, M.U., Waseem, M., Khairi, A. and Mazhar, S., 2015. A critical analysis on the security concerns of internet of things (IoT).International Journal of Computer Applications,111(7). Fletcher, A.J., 2017. Applying critical realism in qualitative research: methodology meets method.International Journal of Social Research Methodology,20(2), pp.181-194.
20RESEARCH PAPER Flick, U., 2015.Introducing research methodology: A beginner's guide to doing a research project. Sage. Gubbi, J., Buyya, R., Marusic, S. and Palaniswami, M., 2013. Internet of Things (IoT): A vision, architecturalelements,andfuturedirections.Futuregenerationcomputersystems,29(7), pp.1645-1660. He, W., Yan, G. and Da Xu, L., 2014. Developing vehicular data cloud services in the IoT environment.IEEE Transactions on Industrial Informatics,10(2), pp.1587-1595. Huh, S., Cho, S. and Kim, S., 2017, February. Managing IoT devices using blockchain platform. In2017 19th international conference on advanced communication technology (ICACT)(pp. 464-467). IEEE. Kelly, S.D.T., Suryadevara, N.K. and Mukhopadhyay, S.C., 2013. Towards the implementation of IoT for environmental condition monitoring in homes.IEEE sensors journal,13(10), pp.3846- 3853. Khan,M.A. andSalah,K., 2018.IoT security:Review,blockchainsolutions,andopen challenges.Future Generation Computer Systems,82, pp.395-411. Kolias, C., Kambourakis, G., Stavrou, A. and Voas, J., 2017. DDoS in the IoT: Mirai and other botnets.Computer,50(7), pp.80-84. Kumar, R., 2019.Research methodology: A step-by-step guide for beginners. Sage Publications Limited. Silverman, D. ed., 2016.Qualitative research. Sage.
21RESEARCH PAPER Lazarescu, M.T., 2013. Design of a WSN platform for long-term environmental monitoring for IoT applications.IEEE Journal on emerging and selected topics in circuits and systems,3(1), pp.45-54. Lee, I. and Lee, K., 2015. The Internet of Things (IoT): Applications, investments, and challenges for enterprises.Business Horizons,58(4), pp.431-440. Lee, S.E., Choi, M. and Kim, S., 2017. How and what to study about IoT: Research trends and future directions from the perspective of social science.Telecommunications Policy,41(10), pp.1056-1067. Madakam, S., Ramaswamy, R. and Tripathi, S., 2015. Internet of Things (IoT): A literature review.Journal of Computer and Communications,3(05), p.164. McCusker, K. and Gunaydin, S., 2015. Research using qualitative, quantitative or mixed methods and choice based on the research.Perfusion,30(7), pp.537-542. Tao, F., Zuo, Y., Da Xu, L. and Zhang, L., 2014. IoT-based intelligent perception and access of manufacturingresourcetowardcloudmanufacturing.IEEETransactionsonIndustrial Informatics,10(2), pp.1547-1557. Tukker, A., De Koning, A., Wood, R., Hawkins, T., Lutter, S., Acosta, J., Rueda Cantuche, J.M., Bouwmeester,M.,Oosterhaven,J.,Drosdowski,T.andKuenen,J.,2013.EXIOPOL– development and illustrative analyses of a detailed global MR EE SUT/IOT.Economic Systems Research,25(1), pp.50-70.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
22RESEARCH PAPER Verma, S., Kawamoto, Y., Fadlullah, Z.M., Nishiyama, H. and Kato, N., 2017. A survey on networkmethodologiesforreal-timeanalyticsofmassiveIoTdataandopenresearch issues.IEEE Communications Surveys & Tutorials,19(3), pp.1457-1477. Walliman, N., 2017.Research methods: The basics. Routledge. Wang, Y.P.E., Lin, X., Adhikary, A., Grövlen, A., Sui, Y., Blankenship, Y., Bergman, J. and Razaghi, H.S., 2016. A primer on 3GPP narrowband Internet of Things (NB-IoT).arXiv preprint arXiv:1606.04171. Xu, T., Wendt, J.B. and Potkonjak, M., 2014, November. Security of IoT systems: Design challenges and opportunities. InProceedings of the 2014 IEEE/ACM International Conference on Computer-Aided Design(pp. 417-423). IEEE Press. Zhang, Z.K., Cho, M.C.Y., Wang, C.W., Hsu, C.W., Chen, C.K. and Shieh, S., 2014, November. IoT security: ongoing challenges and research opportunities. In2014 IEEE 7th international conference on service-oriented computing and applications(pp. 230-234). IEEE. Zhao, K. and Ge, L., 2013, December. A survey on the internet of things security. In2013 Ninth international conference on computational intelligence and security(pp. 663-667). IEEE.