Analysis of Security and Privacy Issues in IoT Applications

Verified

Added on  2023/01/13

|17
|5684
|34
Report
AI Summary
This report provides a comprehensive analysis of security and privacy issues within Internet of Things (IoT) applications, focusing on smart environments such as smart transport, smart grids, smart healthcare, and smart cities. The report begins with an introduction to IoT and its benefits, followed by an in-depth exploration of security and privacy vulnerabilities in each smart environment. It examines specific threats like data breaches, cyberattacks, and identity theft, while also analyzing the privacy concerns related to data collection and surveillance. The report highlights the architecture of each smart environment to better illustrate the vulnerabilities and solutions. Furthermore, the report proposes various solutions and tools, including network segmentation, firewalls, and anti-malware technologies, to mitigate these risks and protect sensitive data. The report concludes by emphasizing the importance of proactive security measures and privacy considerations in the development and deployment of IoT technologies. This report aims to provide a clear understanding of the challenges and potential solutions within the rapidly evolving landscape of IoT security and privacy.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Security and Privacy Issues in IOT
Application
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Abstract
This study shows privacy and security related issues in the context of smart city, smart
grid system, smart transport system and smart healthcare. Different sectors makes an effective
use of advanced technology or internet of things which gives positive impacts as it helps in
speeding up, storing data which save their time. On the flip side, it gives several security
related issues such as stolen of data, attack on system, etc. For solving all these problems,
several techniques and tools have been developed which helps healthcare sectors, smart cities
and other in preventing themselves against loss of data and other security issues.
Document Page
Table of Contents
Abstract........................................................................................................................................2
INTRODUCTION.......................................................................................................................4
1.1 Security and privacy issues in smart environments...............................................................4
Security issues in smart transport system...........................................................................4
Privacy issues in smart transport system`...........................................................................5
Solutions of security and privacy issues of smart transport...............................................6
1.2 Smart grid system..................................................................................................................6
Security issues in smart grid system...................................................................................6
Privacy issues in smart grid system....................................................................................7
Solutions of discussed issues of smart grid........................................................................8
1.3 Smart health care system.......................................................................................................9
Security issues in smart healthcare.....................................................................................9
Privacy issues in smart healthcare......................................................................................9
Solutions of security and privacy issues of smart healthcare...........................................10
1.4 Smart city.............................................................................................................................11
Security issues in smart city.............................................................................................11
Privacy issues in smart city..............................................................................................12
Solutions of security and privacy issues of smart city.....................................................13
CONCLUSION..........................................................................................................................14
REFERENCES..........................................................................................................................16
Document Page
INTRODUCTION
Internet of things refers a system of interrelated computing devices as well as digital
machines which allows people to share data or informations over a network without having
requirement of human to human communication Bertino & Islam, (2017). It saves time of
organizations and people. This study is going to show some privacy and security related issues
for smart environment. All sector are making an effective use of advanced technology and
information of technology devices which gives them several advantages. But on the flip side,
it has some disadvantages as well. It will also show solutions by which smart environment
privacy and security related issues can be solved out.
Further, it will also show both privacy and security related issues as well as solutions
in smart grid system such as identity theft, attack on the system etc. Some privacy and security
related issues creative several problems in healthcare sector which are being discussed in this
study. If they have problems then they have solutions as well and by using different
techniques, policies and tools both types of problems can be solved out. Lastly, this study
discusses security and privacy issues in smart city which is creating problems for people and
the environment as well.
1.1 Security and privacy issues in smart environments
Security issues in smart transport system
Securing the physical and cyber level of infrastructure have the huge level of
undertaking of the stakeholder in intelligent transport systems. The system is majorly had
hackers who are motivated by greed, malice or politics, to nation states looking to create
instability or an advantage during times of tension and uncertainty.
The transportation systems have the advance persistent of threats with the increase use
of mobile devices. It has been reported by professionals as cloud infrastructure along with
mobile devices are surrendered to be the most way of challenging in terms to defend the
traffic attacks. The next challenges is about security talents shortage as half of security teams
are concerned or dedication to wards the work of security. There is existence of lack in
training personnels in order to have adaption advanced level of technologies along with
process development.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
The existence of breaches are considered to be more level of frequent along wit
processes to be flawed as nearly half of transportation security have already being dealt with
public scrutiny due to a data breach. The rise in outsourcing is concerned with one of major
security issues as there is connected level of transportation team have the making or proper
learning by guidance of past mistakes in more to find netter ways to have security of network.
There is riskiness in terms of organization outsource to have lack pd off set internal expertise
tin order to have completion of security task development.
There is also the major level of facing the security challenges in terms of automotive
architecture designs in order to have delectation of malware along with defending the
connected vehicles with it.
Privacy issues in smart transport system`
Privacy has been the primary level of concerns in term of transportation or traffic
system in order to have proper level of tracking of the people, vehicles along with goods to
have the development of national transportation grid. As there is existence of rapid
advancement of technologies which have major level of inclusion photo enforcement,
electronic tolling, vehicle-mile taxing, weigh-in-motion, and Connected Vehicle technologies.
Unfortunately there is no national level standard in order to meet up the privacy level of
protection of travellers information which merely have taken in form in poor way of defining
the precepts.
With increase level of ITS application, there is turning out to be more level of
interwoven a per national transportation grid to ensure provide protections of travelogue
people by ensure broader level of acceptances. The privacy level of concern in the smart
transportation system are such as the-
The privacy concerns are one of key challenges to the vehicle's mile tolling vehicle
which are connection to each other. The next is about lacking of privacy legislations in the
respective are of capturing the surveillance of traffic video.
The major intents of surveillance is the major have the differentiating between the
between casual n targets way of surveillance. The next is about intent of surveillances which is
a key way of differentiating the in term of casual target way to surveillance in more misguided
way. The last is more of data authentication along with confidentiality to have renascence
regarding particular vehicles could have denied as per the authenticity of another vehicle.
Document Page
Solutions of security and privacy issues of smart transport
Security and privacy related issues of smart transport are creating several problems for
people and transportation industry which need to be solved in a timely as well as in an
efficient manner. Some ways and strategies are being discussed which needs to be followed by
information technology team by which both issues can be solved out:
Identifying and responding to present or ongoing cyber attacks in q quick manner.
Applying learned lessons to further defenses in order to prevent people from repeatable
incidents.
Rather, these techniques there are several tools which can also help transportation companies
and people to protect them against security and privacy issues such as:
Network segmentation: By segmenting networks or splitting one network into several
steelworks, people can reduce congestion as well as limit failures. For this, they will require to
hire effective and skilled IT controllers and then allocated all dedicated networks to them
which are separate from the corporate network. By doing tho overall security can be improved
Rehman & et.al., (2016).
Firewalls: Firewalls is an effective tool which does not only monitor ingress but also
monitor egress traffic from bad as well as unknown domains. After monitoring, it identifies
suitable applications which can help it out in generating bad traffic.
Anti-malware: There are several types of malware has been developed which does not
only scan files but also help attackers to block files, informations, and remove them. Main
types of malware are: worms, viruses, rootkits etc. For removing impacts of all this malware
or these types of malware from system, company or people can make an effective use of anti
malware which uses: generic and specific signatures in order to identify or detect both known
and unknown malware. So, it can be said that anti-malware technology is important to reduce
cyber attacks.
1.2 Smart grid system
Security issues in smart grid system
Nowadays technology is increasing day by day and with the increasing use it is
creating some problems for companies. Electric power system has been changed and is being
modified with new information and communication technologies. For providing better and
effective services to customers, a smart grid system is being developed which is based on
Document Page
digital automation technology for controlling, analysing with supply chain Mendel, (2017). It
is having some issues which are discussed below:
Attack the device: A device is the main target for attackers for several reasons. There
are some easy steps by which malicious hackers attack and get access over a system such as
scanning, exploitation etc. In scanning, attackers tries to find out target system's vulnerability.
It can be said that smart grid are value based so, attackers find several benefits of attacking
systems. By scanning and reconnaissance, attackers get sensitive and professional
informations of the company and can take undue advantages of informations.
Attack the communications: There is other method and type of issues which involve
monitoring and altering messages as they are communicated. Smart grid environment makes
these types of attacks dangerous as informations which are communicated could be easily
captured and manipulated. For instance: Data related to energy consumption from business to
their utility provider open up several threats itself. It becomes easy for attackers to track
energy usage as well as also see when company had its downtime and uptime at business in
order to plan an attack on their property Jokar, Arianpoo & Leung, (2016).
Attack the ecosystem: Skilled attackers who have more knowledge they pl,an to
attack the organization as it is at the heart of their smart grid. There are some types of
industries who have more chances to face this problem or security issues such as: solution
providers, device manufacturer and generation plants.
So, from the above it can be said that smart grid not only gives benefits as it has
several security issues.
Privacy issues in smart grid system
Rather, security issues, there are numbers of privacy issues in smart grid system which
can create several other problems for companies and customers as well. Some major and
common privacy issues related to smart grid system discussed as below:
Identity theft: Attackers attack system on which company has all informations related
to their consumers like their name, address, qualifications and other sensitive data. When
attackers scan and attack the system then they get all data which is entered in that target
system Boroojeni, Amini & Iyengar, (2017). So, there are chances of identity theft privacy
issues as attackers can take undue advantages of all that informations related to the company
and consumers.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
In the context of smart grids, it can be said that privacy of people mean to not to
disclose their sensitive or private informations to others than authorized or consented entities.
These data includes: energy usage informations, their address, qualification etc. BY getting
these informations, attackers can accomplish their goals, For example: There is an individual
or attacker or thief who wants to rob house of an individual who has enough money and assets.
By getting informations related to that person like address and others, thieves or attackers can
easily accomplish goals Sagiroglu & et.al. (2016, November).
Solutions of discussed issues of smart grid
There are several tools are available which can be used for solving security and privacy
related issues. For example, for solving security attacks on network, company can make an
effective use of internet protocol security, transport layer security ans secure shell tools. All
these tools help an organization in protecting them against security related problems that
happen on networks. Internet protocol security has encryption technology in order to provide
informations confidentiality and authenticity in a network communication. There are some
attestation mechanisms which can help an organization and an individual in identifying or
detecting attacks by which they can prevent network attacks such as interference attacks
Shahraeini, & Kotzanikolaou (2019).
On the other hand, for preventing organizations and people against privacy related
issues in smart grid, there are some techniques or ways available by which privacy related
issues can be solved out. A technique using battery can be employed. Shamir secret scanning
is other effective method in cryptography which is mainly being used for distributing a secret
between staff members or groups of participants. Under this technique, a secret can be
reconstructed only when shares are combined.
In addition, it is also stated that the main issues of privacy related is theft of sensitive
and personal data which needed to be solved immediately in an efficient manner. It is
important to protect companies and customers against unauthorized access, copying, uses and
loss. Limiting access is one of the common method in which, organizations give access
opportunity to only authorized people. If consumers data are being stored in lightweight
directory access protocol, then company should make an effective use of virtual directory
solutions rather replacing the entire LDAP source. It will allow the company to limit the data
that has been approved over the applications as well as users that uses consumers data.
Document Page
1.3 Smart health care system
Security issues in smart healthcare
Technology has changed this modern world. There are several sectors in which
technology is being used to the great extent and healthcare sector is one of them. The main
aim of health care sector is to treat patients and save lives. Having and sustaining operations
for 24*7 is important for these organizations but there are several organizations who use
outdated systems which create several problems. Some security issues are:
Denial of service attacks: Internet of things devices used in healthcare sector connect
networks, transfer data and communicate with each other. Different departments of health care
sector are interrelated to each other so, it is important for them to connect to networks and
share informations Manogaran & et.al., (2017). Denial of service attacks are one of the main
critic attacks for IOT applications due to machine resources.
Lack of standard architecture: There are several risks which can occur in the future
as due to unavailability of standard architecture for S-CI which is being used to secure
patients' data. It is stated that some studies and hospitals follow hierarchical architecture and
some take hospitals as the TA entity in order to force access policies. So, due to this reason
and chances of loss of patients data, there is requirement to propose an effective or standard
architecture to get access PPPs in S-CI.
Software bugs: Those devices which are mainly based on software are more likely to
become vulnerable to cyber attacks only because of software bugs. This software bugs leave a
hole by which attackers can easily sneak into a target software based systems. It intensifies in
complex systems which consist of several lines of codes where this security bugs invite
attackers by opening up a backdoor for them. After entering in a smart city system, attackers
can easily get control of that system and exploit all available data or informations.
Privacy issues in smart healthcare
Data manipulation: Data is one of the important element for IOT healthcare
applications. Health care organization have all informations related to their patients health and
other informations. These informations or data are being used multiple paths in internet of
things such as data receiver, data producer, aggregation point, the internet, the cloud etc.
Document Page
Attackers can makes an undue advantage or uses of these data by stealing with malicious use.
When these data are being generated and transported by different IOT devices, that time they
steal. After stealing that data, they make changes as per their requirement with the main aim to
redirect victims what attackers want. It directly impacts on the patients' health because doctors
or health care providers give wrong treatments only because of data manipulation He & et.al.,
(2018).
Medjacking: It is stated that attackers can tamper with medical devices in order to hurt
people but there are several cases has been happened. Several devices are already hacked so
that attackers can get into larger medical systems with the main aim to steal health
informations of patients that are protected in devices. This medical devices hijacking are
called Medjacking in which attackers get sensitive data of patients. It directly impacts on
given treatment to patients as they can get infected. In this context, government has
recommended to stop using those medical devices which are vulnerable to cyber attacks. This
device is an infusion pump which delivers nutrients to patients. But by getting access and
Medjacking, attackers can change drugs dosage Shaikh, Parvati & Biradar, (2018, February).
Rather, these attacks there are other types of attacks which can create several problems such
as:
Availability attacks which consists of those attacks which deny some services or may
be brought down the whole system down due to attack.
Integrity attacks in which attacks seek to break into system in order to amalgamate all
stored data. Due to these attacks, attackers stop giving critical services to users or
authorized people and also infect system with viruses and make the system ineffective.
Confidentiality attacks which are concerned to unauthorized access and monitoring
systems to have informations.
So, it can be said that privacy issues are major concern as well as serous problem in
healthcare. It is also important to have proper knowledge in order to solve all these problems.
Solutions of security and privacy issues of smart healthcare
There are several ways by which healthcare organizations can prevent themselves
against security and privacy threats. Some effective solutions are discussed below:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Access control: Access control is one of the common and effective step by which
healthcare sector can protect IOT healthcare applications and secure health data of patients. It
is stated that all devices of internet of things collects patients' data and then transfer it to
healthcare databases so, it is important to have well-designed access control or giving access
to only authorized people Yüksel, Küpçü & Özkasap, (2017).
Training to employees: It is also important for all employers to have awareness and
knowledge about using systems and information security. Organizations should provide
information security awareness training to all staff members which can help them out in
knowing the difference between fake E-mails and knowledge of using informations. They can
also be taught about access control in order to monitor, ensure and protect data, privacy and
patients rights.
IOT health applications: There are several IOT applications by which healthcare
sector can protect itself against any accidents and loss of sensitive data. It is stated that loss,
theft and manipulation in patients data direct impacts on their health due to wrong treatment.
So, it is important to develop and implement effective tools such as: IPS, IDS, firewalls,
transport layer system etc. By making an effective use and development of strong encryption
algorithm, data of patients can be secured and saved from loss or theft.
Rather, tools, healthcare sector can make an effective use of policies, guidelines and
standards related to privacy and security of patients. There are several standards as well as
policies are published or developed by international organizations. Company should make
aware to all employees by communicating all guidelines and policies to them related to data
security can help them in solving both privacy and security related issues.
1.4 Smart city
Security issues in smart city
In the context of smart city, it can be said that population in urban cities in on the rise
which is increasing competition in all industries and this competition putting pressure to
develop technology as well. Advanced technology and using technology by people to the great
extent is increasing security risks. It is stated in this context that, some vulnerabilities has been
discovered by researchers that could allow attackers to turn watering system off and on. So,
from this example, it can be said that smart cities are giving opportunities to attackers to target
for cyber attacks easily. Some security risks involve:
Document Page
Device hijacking: Attacking to the system directly is an easy target for attackers. In
smart cities, attackers can hijack smart metres to siphon energy from a municipality Zhang &
et.al., (2017).
Man in the middle: It happens when attackers redirect communications or
coordination between 2 systems. For instance, attacking an effective waste water system valve
to disrupt operations.
Distributed denial of services: These types of attacks occur at the time of flood and
other natural disasters which disrupt services. Due to natural disasters, users cannot get access
easily and at that time attackers who have great knowledge, they take undue advantages of that
situations. They can breach into the net of interconnected devices and then bury a city system.
Agricultural crop manipulation: When attackers attack on the system and sensors
which are being used by farmers in order to measure rainfall, humidity and temperature for
irrigating crops, have direct impacts on the agricultural crop. Manipulation in these types of
sensors data have negative impacts on crop as it damages them as well as entire region. This
reversible and negative impacts on farms and crops have impacts on the people of that region
as they do not get food or spread diseases due to injected crops Jayapandian, (2019).
So, it can be said that information technology is having several negative impacts which
need to be addressed.
Privacy issues in smart city
Identity theft: Smart cities involve data related to individuals and their citizens which
consists of at-most informations. There are several governmental platforms that stores
personal data of individuals which are valuable and sensitive. There are several people who
intentionally get these informations by scanning and other ways. If one of the information get
leaked then it can tell attackers about their schedule. For example: If attackers or thieves
knowingly get or stole these informations where they find address of an individual then they
can rob their home while they are away Gope & et.al., (2018). So, it can be said that loss of
data can create several problems for people.
There are several types of privacy and attacks issues such as:
Identity privacy which mainly deals or concern with the securing of personal
informations related to people.
Bodily privacy is other type that is concerned with securing physical aspects.
Document Page
Territorial privacy which focuses on securing personal property as well as space of an
individual.
Mobility privacy whose main aim to secure the location in order to protect people
against tracking.
Communication privacy which concerned with protecting communication channels
against eavesdropping. These channels give limited access to transfer data.
Transaction privacy which mainly focus on protecting responses against monitoring.
Attack on user equipments: Different people or users of smart city are allowed to use
value added services as well as participate in crowd sensing. For this purpose, they use their
mobile phones to the great extent which has more chances or prone to several vulnerabilities.
All users are allowed to identify and secure their phone by international mobile station
equipment identity. This code or IMEI related to owner of mobile phones in order to get their
personal informations as well as tracking their mobile device if required. But there are several
users of people who have reckless behaviours towards giving access permission to malicious
applications. Some users do not have knowledge about giving informations as they do not
cross verify that if they are giving informations to authorized person or to attackers. After
giving all informations to attackers unknowingly can access user's information and control
their device Eckhoff & Wagner, (2017).
So, from the above it can be said that people awareness is important for solving all
these problems related to privacy as most of the problems is occurring due to lack of
awareness.
Solutions of security and privacy issues of smart city
There are several techniques which can be implemented in order to prevent cities and
people from security and privacy issues. Some effective techniques include:
Implementing IP address restrictions for those who have knowledge to get access and
connect to the smart city devices or attackers. Attackers mainly rely on public
networks and by restricting them to get access, security of the city can be improved.
Developing strong network security rules in order to prevent access and restrict
attackers to get access to sensitive systems.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
By hiring skilled and ethical hackers that can work in favor of securing people and
smart cities from attackers. Ethical hackers have ability to think like them and find
flaws in systems before attackers do.
Multi environment support: Under this technique, a smart city requires spreading or
deploy its security platform across some disparate system that make up smart city
environment. After than, it should be supported on IaaS, on premises in order to make sure
that no single device remains unconnected Verma & et.al., (2019).
Data encryption: There is a requirement to encrypt data to not only in rest but also in
transit. For decoding, there is a requirement to develop a strong encryption password.
Developing encryption password is very important because city systems use as well as handle
sensitive data to the great extent such as PII. The main aim of encryption is to resist or prevent
attackers from making undue advantages of data in case of a breach. By using 2 factor
authentication, smart city can prevent themselves from unauthorized access.
Security analysis: A smart city should develop a security platform who can analyse
and monitor data across several systems. This platform should analyse data and try to search
for potential indicators in order to identify potential threats. If it suspects any defect then it
should immediately inform to security department or implement security measures like
isolating affected device.
So, from the above discussed solutions, it can be said that smart cities can prevent
themselves from privacy and security issues.
CONCLUSION
From the above file it can be concluded that Internet of things allows people to share
data or information over a network effective with the use of advanced technology and
information of technology devices. But the internet of thing are clearly the major issues which
are related health cares systems. This issues are such as the Denial of service attacks several
risks which can occur in the future as due to unavailability of standard architecture for S-CI
which is being used to secure patients' data. Unfortunately there is no national level standard
in order to meet up the privacy level of protection. The report have also the major level of
discussion on the malicious hackers attack and target system's vulnerability which is easy for
attackers to track energy usage along with planning to have an attack on their property. This
also have the resultant to the make level of identification d the theft privacy issues as attackers
Document Page
can take undue advantages of all that information related to the company and consumers.
There are major level of privacy issues are concern in traffic system development along with
being in smart healthcare. It directly impacts on the patients' health because doctors or health
care providers give wrong treatments only because of data manipulation. At last, it can be
states that the development of information technology is having the negative impacts as well
as positive in development of smart city.
Document Page
REFERENCES
Books and journals
Ati, M., & Basmaji, T. (2018, April). Framework for managing smart cities security and
privacy applications. In 2018 IEEE Symposium on Computer Applications &
Industrial Electronics (ISCAIE) (pp. 191-194). IEEE.
Bertino, E., & Islam, N. (2017). Botnets and internet of things security. Computer, 50(2), 76-
79.
Bhuvaneswari, A., 2017. A Survey on Internet of Things [IoT]. International Journal of
Advanced Research in Computer Science.8(1).
Boroojeni, K. G., Amini, M. H., & Iyengar, S. S. (2017). Smart grids: security and privacy
issues. Springer International Publishing.
Eckhoff, D., & Wagner, I. (2017). Privacy in the smart city—applications, technologies,
challenges, and solutions. IEEE Communications Surveys & Tutorials. 20(1). 489-516.
Gope, P. & et.al., (2018). Lightweight and privacy-preserving RFID authentication scheme for
distributed IoT infrastructure with secure localization services for smart city
environment. Future Generation Computer Systems. 83. 629-637.
He, D. & et.al., (2018). Privacy in the Internet of Things for smart healthcare. IEEE
Communications Magazine. 56(4). 38-44.
Jayapandian, N. (2019). Threats and Security Issues in Smart City Devices. In Secure Cyber-
Physical Systems for Smart Cities (pp. 220-250). IGI Global.
Jokar, P., Arianpoo, N., & Leung, V. C. (2016). A survey on security issues in smart
grids. Security and Communication Networks. 9(3). 262-273.
Kizza, J.M., 2017. Mobile systems and their intractable social, ethical and security issues. In
Ethical and Social Issues in the Information Age (pp. 321-338). Springer, Cham.
Manogaran, G. & et.al., (2017). Big data security intelligence for healthcare industry 4.0.
In Cybersecurity for Industry 4.0 (pp. 103-126). Springer, Cham.
Mendel, J. (2017). Smart grid cyber security challenges: Overview and classification. E-
mentor. 68(1). 55-66.
Natarajan, K., Prasath, B., & Kokila, P. (2016). Smart health care system using internet of
things. Journal of Network Communications and Emerging Technologies (JNCET). 6(3).
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Rehman, S. U. & et.al., (2016). Security and privacy issues in IoT. International journal of
communication networks and information security, 8(3), 147.
Sagiroglu, S. & et.al. (2016, November). Big data issues in smart grid systems. In 2016 IEEE
International Conference on Renewable Energy Research and Applications
(ICRERA) (pp. 1007-1012). IEEE.
Shahraeini, M., & Kotzanikolaou, P. (2019). A Dependency Analysis Model for Resilient
Wide Area Measurement Systems in Smart Grid. IEEE Journal on Selected Areas in
Communications.
Shaikh, Y., Parvati, V. K., & Biradar, S. R. (2018, February). Survey of Smart Healthcare
Systems using Internet of Things (IoT). In 2018 International Conference on
Communication, Computing and Internet of Things (IC3IoT) (pp. 508-513). IEEE.
Verma, A. & et.al., (2019). Security and privacy in smart city applications and services:
Opportunities and challenges. In Cybersecurity and Secure Information Systems (pp. 1-
15). Springer, Cham.
Yüksel, B., Küpçü, A., & Özkasap, Ö. (2017). Research issues for privacy and security of
electronic health services. Future Generation Computer Systems. 68. 1-13.
Zhang, K. & et.al., (2017). Security and privacy in smart city applications: Challenges and
solutions. IEEE Communications Magazine. 55(1). 122-129.
chevron_up_icon
1 out of 17
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]