ITC595 Research Project: Security and Privacy in IoT Architectures
VerifiedAdded on  2022/11/10
|5
|3113
|303
Report
AI Summary
This report provides a comprehensive overview of security and privacy issues within the Internet of Things (IoT) and smart architectures. It explores the increasing use of IoT in various industries, highlighting the importance of edge computing and its impact on IoT applications. The report delves into critical research on data security and privacy, emphasizing the role of Cyber-Physical Systems (CPS) in safeguarding information against various threats such as malware and viruses. It analyzes the need for robust security measures at different layers, including application, communication, and actuator layers, and examines various encryption and decryption methods. The report also addresses challenges like DDOS attacks, ad-hoc networks, and malware, while identifying gaps in existing literature. Relevant technologies like wireless networks, Wi-Fi, Zigbee, and Wimax, along with their applications, are discussed. The report concludes by emphasizing the need for continuous improvement in IoT security to protect against evolving threats and ensure the reliable functioning of smart systems.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Abstract- From the last two decades, Internet-of-
Things (IoT) has been used in most industries for
netter performance and growth. It reduces failure
rates in the various fields using user’s experience and
resilience about different services. In addition, edge
computing, based IoT will make huge impacts on IoT
applications. This paper will provide an overview of
edge computing in the IoT infrastructure as well as
other IoT applications. It conducts critical research
on the security and privacy of data, which was
collected by the IoT devices. Besides, edge
computing will improve the performance and
efficiency of the whole systems with a high level of
security and privacy of data and information in
various IoT applications, including smart cities, smart
transportation, smart grid, and many more. This
paper will include all the parameters, which has
related to real-world applications. Thus, Cyber-
Physical Systems (CPS) can use for the security and
privacy of data and information. It will also increase
the response time of the IoT applications. This paper
will analyse the basic need for security and privacy of
data as well as transmission of information. However,
security and privacy issues will face by most of the
applications. There are some various encryption and
decryptions methods available for security and
privacy of the data, which can be used for more
security of devices and their data. Edge computing
provides better security of the data. In addition, this
paper will provide a different level of security at
various layers, such as application, communication,
and actuator layer. CPS will helpful in the security
and privacy of the data from various types of security
attacks, such as malware, viruses, and many more.
Keywords: CPS, IoT, smart cities and so on.
Introduction
IoT is a technology which delivers a stage for
connecting computing devices and networks with
each other without using human to human
interaction. Recently, the utilization of IoT enabled
devices are growing rapidly and smart city and smart
architectures both are effective applications of the
internet of things where the consumers can control
and handle networks from any location. Security and
privacy both are key issues linked with the IoT
networks that may impact on the performance of
computer networks and physical devices (Abomhara,
& Køien, 2014). The significance of this article is to
evaluate and describe the security related issues faced
by users while accessing IoT networks and identify
the gaps in the recent literature
based on IoT. It is examined thatin the architectures,
the use of IoT is an effective strategy that helps the
consumers for exchanging data over the networks and
devices without requiring any human interaction.
This report will cover various sections, including
relevant technologies and applications, challenges
linked with IoT and many more.
Overview of the technology
Internet of thing is an effective commination
technology which is now used in the business
communities for performing data communication
between the computing devices and networks. In
smart architecture, IoT enabled networks are able to
control and attach numerous plans with each other
and reduce communication problems. Using such
technology the consumers can easily access data and
control computing devices from any location and
reduce the conflicts effectively (Choudhary, & Jain,
2016). It is observed that IoT provide a platform to
connect numbers of devices with each other and
reduce the communication gaps between the
networks and computing devices.
There are major three aspects of IoT technology in
the context of smart architecture, for example,
monitoring systems through remote access,
improving the performance of developed systems and
provide autonomous processes. From the previous
investigation, it is observed that IoT is system which
is used for linking physical expedients with things
using internet connections (Bekara, 2014). A thing in
IoT may be a user with an emotion screen graft and
consumers can easily perform data transmission over
the long distance. Internet of things evolved from
machine to machine communication where
computing devices are connected with each other
using internet connectivity.
In the context of smart architecture IoT networks
effectively control two or more networking devices
and reduce the errors faced by the consumers. It is
Security and privacy issues in the Internet
of Things (IoT) /Smart Architectures
Things (IoT) has been used in most industries for
netter performance and growth. It reduces failure
rates in the various fields using user’s experience and
resilience about different services. In addition, edge
computing, based IoT will make huge impacts on IoT
applications. This paper will provide an overview of
edge computing in the IoT infrastructure as well as
other IoT applications. It conducts critical research
on the security and privacy of data, which was
collected by the IoT devices. Besides, edge
computing will improve the performance and
efficiency of the whole systems with a high level of
security and privacy of data and information in
various IoT applications, including smart cities, smart
transportation, smart grid, and many more. This
paper will include all the parameters, which has
related to real-world applications. Thus, Cyber-
Physical Systems (CPS) can use for the security and
privacy of data and information. It will also increase
the response time of the IoT applications. This paper
will analyse the basic need for security and privacy of
data as well as transmission of information. However,
security and privacy issues will face by most of the
applications. There are some various encryption and
decryptions methods available for security and
privacy of the data, which can be used for more
security of devices and their data. Edge computing
provides better security of the data. In addition, this
paper will provide a different level of security at
various layers, such as application, communication,
and actuator layer. CPS will helpful in the security
and privacy of the data from various types of security
attacks, such as malware, viruses, and many more.
Keywords: CPS, IoT, smart cities and so on.
Introduction
IoT is a technology which delivers a stage for
connecting computing devices and networks with
each other without using human to human
interaction. Recently, the utilization of IoT enabled
devices are growing rapidly and smart city and smart
architectures both are effective applications of the
internet of things where the consumers can control
and handle networks from any location. Security and
privacy both are key issues linked with the IoT
networks that may impact on the performance of
computer networks and physical devices (Abomhara,
& Køien, 2014). The significance of this article is to
evaluate and describe the security related issues faced
by users while accessing IoT networks and identify
the gaps in the recent literature
based on IoT. It is examined thatin the architectures,
the use of IoT is an effective strategy that helps the
consumers for exchanging data over the networks and
devices without requiring any human interaction.
This report will cover various sections, including
relevant technologies and applications, challenges
linked with IoT and many more.
Overview of the technology
Internet of thing is an effective commination
technology which is now used in the business
communities for performing data communication
between the computing devices and networks. In
smart architecture, IoT enabled networks are able to
control and attach numerous plans with each other
and reduce communication problems. Using such
technology the consumers can easily access data and
control computing devices from any location and
reduce the conflicts effectively (Choudhary, & Jain,
2016). It is observed that IoT provide a platform to
connect numbers of devices with each other and
reduce the communication gaps between the
networks and computing devices.
There are major three aspects of IoT technology in
the context of smart architecture, for example,
monitoring systems through remote access,
improving the performance of developed systems and
provide autonomous processes. From the previous
investigation, it is observed that IoT is system which
is used for linking physical expedients with things
using internet connections (Bekara, 2014). A thing in
IoT may be a user with an emotion screen graft and
consumers can easily perform data transmission over
the long distance. Internet of things evolved from
machine to machine communication where
computing devices are connected with each other
using internet connectivity.
In the context of smart architecture IoT networks
effectively control two or more networking devices
and reduce the errors faced by the consumers. It is
Security and privacy issues in the Internet
of Things (IoT) /Smart Architectures
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

true that using the internet of things the companies
can enhance their performance and manage entire IT
infrastructure in an appropriate manner. IoT play a
major role in business communities because of their
ability to enhance the effectiveness of computing
devices and servers. Moreover, such kind of
communication technology helps the consumers live
and connect physical devices and things with each
other and reduce communication barriers. Frustaci,
Pace, Aloi, & Fortino, (2017) argued that IoT enabled
networks provides businesses to perform real-time
communication with computing networks and things
without using human to human interaction.
Relevant technologies and their applications
It is identified that the IoT is an advanced
communication technology which helps the
consumers for performing data communication
activities effectively. In order to control and provide
proper communication over the networks the IoT
networks include numerous technologies which are
described below along with their applications:
Wireless networks
It is the effective technologies used in the IoT
networks for performing data communication
between two or more devices and reduce the
communication gaps. With the help of wireless
networks, IoT can easily connect numbers of devices
without using any connecting cable. The key role of a
wireless is that it provides data transmission over the
servers and systems using network protocols and
communication channels (Hossain, Fotouhi, &
Hasan, 2015).
Applications
ï‚· For communication purpose
ï‚· Connecting two or more devices with each
other
ï‚· In telecommunication systems
Wi-Fi innovation
It is a pushed version of Bluetooth that can send and
get data from one device to others. Principally, it is
included in the companies and business communities
for exchanging data between the networks (Khan, &
Salah, 2018). It is seen that Wi-Fi is characterized as
the remote systems administration convention which
enables PC and cell phones to interconnect with
utilizing web availability. It is an industry term which
speaks to a sort of remote neighbourhood innovation
base on the 802.11 IEEE arranges models.
There are a few focal points of this innovation, for
example, increasingly simple to interface and
comprehend, solid, successful instead of Bluetooth
can be utilized for long separation, enormous
information speed, etc. It is examined the security of
this IoT organize innovation is exceptionally less and
purchasers can be lost their private subtleties while
associating with unauthentic systems and servers
(Ngu, et al., 2016).
Applications
• For home systems
• Wireless hotspot innovation
• For trading data
• Long separation correspondence
• Home applications
Zigbee
It is branded as the open IoT communication which is
related to a standard network engineering using the
OSI (Frustaci, Pace, Aloi, & Fortino, 2017). Such IoT
technology is simple and straightforward for
actualizing and requires less capability to work. In
addition, this sort of IoT innovation furnishes
adaptability to accomplish more with the dependable
remote execution.
Applications
There are following utilization of Zigbee remote
innovation:
• Wireless home computerization
• Controlling and observing PC
gadgets
• Industrial computerization
• Smart resource following
• Smart framework checking
Wimax
It is the best technology used for data communication
and involves in the IoT networks. It is argue that
Wimex is the best technology which may be used in
the long distance communication and reduce
communication gaps appropriately (Mahmoud,
Yousuf, Aloul, & Zualkernan, 2015). Ongoing
examination distinguished that the expense of Wimax
innovation depends on the separation among
transmitter and recipient and it is one of the
adaptations of 4G IoT system that improves the
adaptability of systems (Matharu, Upadhyay, &
Chaudhary, 2014).
Applications
• Connectivity for SMBs
• Winmax backhaul
• For associating at least two gadgets
• Private systems
can enhance their performance and manage entire IT
infrastructure in an appropriate manner. IoT play a
major role in business communities because of their
ability to enhance the effectiveness of computing
devices and servers. Moreover, such kind of
communication technology helps the consumers live
and connect physical devices and things with each
other and reduce communication barriers. Frustaci,
Pace, Aloi, & Fortino, (2017) argued that IoT enabled
networks provides businesses to perform real-time
communication with computing networks and things
without using human to human interaction.
Relevant technologies and their applications
It is identified that the IoT is an advanced
communication technology which helps the
consumers for performing data communication
activities effectively. In order to control and provide
proper communication over the networks the IoT
networks include numerous technologies which are
described below along with their applications:
Wireless networks
It is the effective technologies used in the IoT
networks for performing data communication
between two or more devices and reduce the
communication gaps. With the help of wireless
networks, IoT can easily connect numbers of devices
without using any connecting cable. The key role of a
wireless is that it provides data transmission over the
servers and systems using network protocols and
communication channels (Hossain, Fotouhi, &
Hasan, 2015).
Applications
ï‚· For communication purpose
ï‚· Connecting two or more devices with each
other
ï‚· In telecommunication systems
Wi-Fi innovation
It is a pushed version of Bluetooth that can send and
get data from one device to others. Principally, it is
included in the companies and business communities
for exchanging data between the networks (Khan, &
Salah, 2018). It is seen that Wi-Fi is characterized as
the remote systems administration convention which
enables PC and cell phones to interconnect with
utilizing web availability. It is an industry term which
speaks to a sort of remote neighbourhood innovation
base on the 802.11 IEEE arranges models.
There are a few focal points of this innovation, for
example, increasingly simple to interface and
comprehend, solid, successful instead of Bluetooth
can be utilized for long separation, enormous
information speed, etc. It is examined the security of
this IoT organize innovation is exceptionally less and
purchasers can be lost their private subtleties while
associating with unauthentic systems and servers
(Ngu, et al., 2016).
Applications
• For home systems
• Wireless hotspot innovation
• For trading data
• Long separation correspondence
• Home applications
Zigbee
It is branded as the open IoT communication which is
related to a standard network engineering using the
OSI (Frustaci, Pace, Aloi, & Fortino, 2017). Such IoT
technology is simple and straightforward for
actualizing and requires less capability to work. In
addition, this sort of IoT innovation furnishes
adaptability to accomplish more with the dependable
remote execution.
Applications
There are following utilization of Zigbee remote
innovation:
• Wireless home computerization
• Controlling and observing PC
gadgets
• Industrial computerization
• Smart resource following
• Smart framework checking
Wimax
It is the best technology used for data communication
and involves in the IoT networks. It is argue that
Wimex is the best technology which may be used in
the long distance communication and reduce
communication gaps appropriately (Mahmoud,
Yousuf, Aloul, & Zualkernan, 2015). Ongoing
examination distinguished that the expense of Wimax
innovation depends on the separation among
transmitter and recipient and it is one of the
adaptations of 4G IoT system that improves the
adaptability of systems (Matharu, Upadhyay, &
Chaudhary, 2014).
Applications
• Connectivity for SMBs
• Winmax backhaul
• For associating at least two gadgets
• Private systems

Challenges and issues related to IoT
It is recognized that IoT is a developing data
innovation which is currently utilized in the business
networks for lessening correspondences holes and
improving the execution of processing systems.
Security and protection both are vital terms with
regards to IoT and over 67% of organizations were
experienced digital assaults due to IoT empowered
systems and IoT innovation (Razzaq, et al., 2017).
There are the following difficulties and security
issues connected with IoT:
DDOS attack
It is one of the basic security assault happen in the
IoT systems which is a piece of digital assault. In
such sort of security issue, lawbreakers produce a
huge measure of traffic flag by utilizing malware
programming and move to the systems and gadgets
connected with PC frameworks (Tankard, 2015).
Because of such sort of security issue, numerous
buyers and organizations were lost their private
subtleties and data since programmers assaulted on
their PC systems. Additionally, the amount of traffic
sign expected to influence the PC gadgets can be a lot
bigger as a contrast with the capacities of a solitary
machine.
Ad-hoc networks
It is one of the regular techniques which are used by
programmers for focusing on IoT systems utilized by
organizations. Principally specially appointed system
issue requires the physical access of systems for
which programmers go into the client's PC gadgets.
In such sort of issue, a programmer sets up a passage
for their utilization and recognizes the login ID and
passwords of client's PC gadgets for acquiring their
own data (Yang, et al., 2017).
Arrangement issues
Arrangement strife is another key issue happen in the
IoT systems which lessen the security of systems and
upgrade the pace of digital assaults. In addition,
simple arrangement issues are regularly the reason
for some vulnerabilities, this is on the grounds that
numerous clients passageway's ship with no security
design (Aldosari, Snasel, & Abraham, 2016).
Malware assault
Malware is a sort of programming which is utilized
by programmers for hindering the security
frameworks of client's IoT systems. It is one of the
basic security issues happen in IoT in light of the fact
that systems are linked with one another by utilizing
web availability and programmers send an
undesirable sign to IoT arranges so as to go into their
frameworks. By utilizing such sort of assault
programmers can get individual information and data
of clients.
Gaps in the literature
In the last five years, there are numerous papers were
published on IoT/smart architecture and identified the
security related issues related to IoT technology. This
section identifies the viewpoints of other experts and
investigation gaps happened in the present literature.
Yoon, Park, & Yoo, (2015) argued that security of
data mainly depends on the networks and devices
used in the IoT because the hackers attack on the
computing devices and servers for performing data
breach activities. It is true that lack of privacy and the
occurrence of unwanted signals both are major
factors that lead to security risks and issues in the IoT
networks. After evaluating and analyzing the current
literature it is found that the problem of
misconfiguration and limitations of IoT networks
have been addressed by which the users can easily
connect devices with things and perform data
transmission process effectively.
Zhang, et al., (2014) identified that DDOS is one of
the biggest security attacks occurred in the IoT
networks that negatively impacts on the sensitive data
of the users. In this literature, the authors provided
theoretical information about IoT and security issues
which produced a gap in the research and affected the
quality of the investigation. Moreover, in the
previous papers, the authors addressed the issue of a
data breach, security risks and other problems related
to the IoT. Zhou, Cao, Dong, & Vasilakos, (2017)
conducted literature and identified that malware and
conflicts both are common issues related to the
internet of things that produced financial issues in the
companies.
Therefore, it is reported in the current literature the
problems linked with IoT networks have been talked
in the present works and papers (Zhang, et al., 2014).
Moreover, in the literature, the authors have not been
addressed the issue of malware signs and false access
occurred in the IoT technology. According to my
opinion, it is very significant to understand and
identify the safety subjects and intimidations related
to the IoT networks that affect the personal
information of the users.
It is true that malware and DDOS both are serious
attacks faced by the users while adopting IoT devices
so, providing proper information and critical
evaluation about security issues in IoT may help for
reducing gaps between the research and information.
It is recognized that IoT is a developing data
innovation which is currently utilized in the business
networks for lessening correspondences holes and
improving the execution of processing systems.
Security and protection both are vital terms with
regards to IoT and over 67% of organizations were
experienced digital assaults due to IoT empowered
systems and IoT innovation (Razzaq, et al., 2017).
There are the following difficulties and security
issues connected with IoT:
DDOS attack
It is one of the basic security assault happen in the
IoT systems which is a piece of digital assault. In
such sort of security issue, lawbreakers produce a
huge measure of traffic flag by utilizing malware
programming and move to the systems and gadgets
connected with PC frameworks (Tankard, 2015).
Because of such sort of security issue, numerous
buyers and organizations were lost their private
subtleties and data since programmers assaulted on
their PC systems. Additionally, the amount of traffic
sign expected to influence the PC gadgets can be a lot
bigger as a contrast with the capacities of a solitary
machine.
Ad-hoc networks
It is one of the regular techniques which are used by
programmers for focusing on IoT systems utilized by
organizations. Principally specially appointed system
issue requires the physical access of systems for
which programmers go into the client's PC gadgets.
In such sort of issue, a programmer sets up a passage
for their utilization and recognizes the login ID and
passwords of client's PC gadgets for acquiring their
own data (Yang, et al., 2017).
Arrangement issues
Arrangement strife is another key issue happen in the
IoT systems which lessen the security of systems and
upgrade the pace of digital assaults. In addition,
simple arrangement issues are regularly the reason
for some vulnerabilities, this is on the grounds that
numerous clients passageway's ship with no security
design (Aldosari, Snasel, & Abraham, 2016).
Malware assault
Malware is a sort of programming which is utilized
by programmers for hindering the security
frameworks of client's IoT systems. It is one of the
basic security issues happen in IoT in light of the fact
that systems are linked with one another by utilizing
web availability and programmers send an
undesirable sign to IoT arranges so as to go into their
frameworks. By utilizing such sort of assault
programmers can get individual information and data
of clients.
Gaps in the literature
In the last five years, there are numerous papers were
published on IoT/smart architecture and identified the
security related issues related to IoT technology. This
section identifies the viewpoints of other experts and
investigation gaps happened in the present literature.
Yoon, Park, & Yoo, (2015) argued that security of
data mainly depends on the networks and devices
used in the IoT because the hackers attack on the
computing devices and servers for performing data
breach activities. It is true that lack of privacy and the
occurrence of unwanted signals both are major
factors that lead to security risks and issues in the IoT
networks. After evaluating and analyzing the current
literature it is found that the problem of
misconfiguration and limitations of IoT networks
have been addressed by which the users can easily
connect devices with things and perform data
transmission process effectively.
Zhang, et al., (2014) identified that DDOS is one of
the biggest security attacks occurred in the IoT
networks that negatively impacts on the sensitive data
of the users. In this literature, the authors provided
theoretical information about IoT and security issues
which produced a gap in the research and affected the
quality of the investigation. Moreover, in the
previous papers, the authors addressed the issue of a
data breach, security risks and other problems related
to the IoT. Zhou, Cao, Dong, & Vasilakos, (2017)
conducted literature and identified that malware and
conflicts both are common issues related to the
internet of things that produced financial issues in the
companies.
Therefore, it is reported in the current literature the
problems linked with IoT networks have been talked
in the present works and papers (Zhang, et al., 2014).
Moreover, in the literature, the authors have not been
addressed the issue of malware signs and false access
occurred in the IoT technology. According to my
opinion, it is very significant to understand and
identify the safety subjects and intimidations related
to the IoT networks that affect the personal
information of the users.
It is true that malware and DDOS both are serious
attacks faced by the users while adopting IoT devices
so, providing proper information and critical
evaluation about security issues in IoT may help for
reducing gaps between the research and information.

Therefore, it is reported that in the current literature
conflicts, misconfiguration and security challenges
linked with IoT have been addressed but the authors
did not provide any effective strategies and methods
for improving the privacy of IoT networks.
Conclusion and future research
It is found that smart architecture is an effective
application of IoT technology but security-attack is
the biggest problem linked with IoT enabled devices.
This research identified the technologies used in the
IoT and reviewed applications of these technologies.
It is identified that malware and DDOS both are
major attacks occurred in the IoT that reduce the
performance of computing networks linked with IoT
servers. In future research, the author will review and
analyze the risk elements related to the IoT
technology and develop effective security policies for
improving the privacy of IoT networks. In order to
reduce the gaps occurred in the literature, the
researchers will design a survey and identify the
opinions of members on IoT security and provide
better prevention techniques.
conflicts, misconfiguration and security challenges
linked with IoT have been addressed but the authors
did not provide any effective strategies and methods
for improving the privacy of IoT networks.
Conclusion and future research
It is found that smart architecture is an effective
application of IoT technology but security-attack is
the biggest problem linked with IoT enabled devices.
This research identified the technologies used in the
IoT and reviewed applications of these technologies.
It is identified that malware and DDOS both are
major attacks occurred in the IoT that reduce the
performance of computing networks linked with IoT
servers. In future research, the author will review and
analyze the risk elements related to the IoT
technology and develop effective security policies for
improving the privacy of IoT networks. In order to
reduce the gaps occurred in the literature, the
researchers will design a survey and identify the
opinions of members on IoT security and provide
better prevention techniques.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

References
Abomhara, M., & Køien, G. M. (2014). Security and
privacy in the Internet of Things: Current status and
open issues. In 2014 international conference on
privacy and security in mobile systems (PRISMS),
12(6), 1-8.
Choudhary, G., & Jain, A. K. (2016). Internet of
Things: A survey on architecture, technologies,
protocols and challenges. In 2016 International
Conference on Recent Advances and Innovations in
Engineering (ICRAIE), 12(6), 1-8.
Bekara, C. (2014). Security issues and challenges for
the IoT-based smart grid. Procedia Computer
Science, 34(7), 532-537.
Frustaci, M., Pace, P., Aloi, G., & Fortino, G. (2017).
Evaluating critical security issues of the IoT world:
Present and future challenges. IEEE Internet of
Things Journal, 5(4), 2483-2495.
Hossain, M. M., Fotouhi, M., & Hasan, R. (2015).
Towards an analysis of security issues, challenges,
and open problems in the internet of things. In 2015
IEEE World Congress on Services, 8(6), 21-28.
Khan, M. A., & Salah, K. (2018). IoT security:
Review, blockchain solutions, and open
challenges. Future Generation Computer
Systems, 82, 395-411.
Mahmoud, R., Yousuf, T., Aloul, F., & Zualkernan, I.
(2015). Internet of things (IoT) security: Current
status, challenges and prospective measures. In 2015
10th International Conference for Internet
Technology and Secured Transactions (ICITST),
12(8), 336-341.
Matharu, G. S., Upadhyay, P., & Chaudhary, L.
(2014). The internet of things: Challenges & security
issues. In 2014 International Conference on
Emerging Technologies (ICET), 8(6), 54-59.
Ngu, A. H., Gutierrez, M., Metsis, V., Nepal, S., &
Sheng, Q. Z. (2016). IoT middleware: A survey on
issues and enabling technologies. IEEE Internet of
Things Journal, 4(1), 1-20.
Razzaq, M. A., Gill, S. H., Qureshi, M. A., & Ullah,
S. (2017). Security issues in the Internet of Things
(IoT): A comprehensive study. International Journal
of Advanced Computer Science and
Applications, 8(6), 383.
Tankard, C. (2015). The security issues of the
Internet of Things. Computer Fraud &
Security, 2015(9), 11-14.
Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017).
A survey on security and privacy issues in Internet-
of-Things. IEEE Internet of Things Journal, 4(5),
1250-1258.
Aldosari, H. M., Snasel, V., & Abraham, A. (2016).
A New Security Layer for Improving the security of
internet of things (IoT). Internation Journal of
Computer Information Systems and Industrial
Management Applications, 8(6), 275-283.
Zhang, Z. K., Cho, M. C. Y., Wang, C. W., Hsu, C.
W., Chen, C. K., & Shieh, S. (2014). IoT security:
ongoing challenges and research opportunities.
In 2014 IEEE 7th international conference on
service-oriented computing and applications, 12(6),
230-234.
Abomhara, M., & Køien, G. M. (2014). Security and
privacy in the Internet of Things: Current status and
open issues. In 2014 international conference on
privacy and security in mobile systems (PRISMS),
12(6), 1-8.
Choudhary, G., & Jain, A. K. (2016). Internet of
Things: A survey on architecture, technologies,
protocols and challenges. In 2016 International
Conference on Recent Advances and Innovations in
Engineering (ICRAIE), 12(6), 1-8.
Bekara, C. (2014). Security issues and challenges for
the IoT-based smart grid. Procedia Computer
Science, 34(7), 532-537.
Frustaci, M., Pace, P., Aloi, G., & Fortino, G. (2017).
Evaluating critical security issues of the IoT world:
Present and future challenges. IEEE Internet of
Things Journal, 5(4), 2483-2495.
Hossain, M. M., Fotouhi, M., & Hasan, R. (2015).
Towards an analysis of security issues, challenges,
and open problems in the internet of things. In 2015
IEEE World Congress on Services, 8(6), 21-28.
Khan, M. A., & Salah, K. (2018). IoT security:
Review, blockchain solutions, and open
challenges. Future Generation Computer
Systems, 82, 395-411.
Mahmoud, R., Yousuf, T., Aloul, F., & Zualkernan, I.
(2015). Internet of things (IoT) security: Current
status, challenges and prospective measures. In 2015
10th International Conference for Internet
Technology and Secured Transactions (ICITST),
12(8), 336-341.
Matharu, G. S., Upadhyay, P., & Chaudhary, L.
(2014). The internet of things: Challenges & security
issues. In 2014 International Conference on
Emerging Technologies (ICET), 8(6), 54-59.
Ngu, A. H., Gutierrez, M., Metsis, V., Nepal, S., &
Sheng, Q. Z. (2016). IoT middleware: A survey on
issues and enabling technologies. IEEE Internet of
Things Journal, 4(1), 1-20.
Razzaq, M. A., Gill, S. H., Qureshi, M. A., & Ullah,
S. (2017). Security issues in the Internet of Things
(IoT): A comprehensive study. International Journal
of Advanced Computer Science and
Applications, 8(6), 383.
Tankard, C. (2015). The security issues of the
Internet of Things. Computer Fraud &
Security, 2015(9), 11-14.
Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017).
A survey on security and privacy issues in Internet-
of-Things. IEEE Internet of Things Journal, 4(5),
1250-1258.
Aldosari, H. M., Snasel, V., & Abraham, A. (2016).
A New Security Layer for Improving the security of
internet of things (IoT). Internation Journal of
Computer Information Systems and Industrial
Management Applications, 8(6), 275-283.
Zhang, Z. K., Cho, M. C. Y., Wang, C. W., Hsu, C.
W., Chen, C. K., & Shieh, S. (2014). IoT security:
ongoing challenges and research opportunities.
In 2014 IEEE 7th international conference on
service-oriented computing and applications, 12(6),
230-234.
1 out of 5
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.