An Overview of Security in the Internet of Things (IoT) Systems
VerifiedAdded on 2021/05/27
|12
|3028
|203
Report
AI Summary
This report provides a comprehensive overview of security in the Internet of Things (IoT). It begins with an introduction to IoT, explaining its applications in various domains like smart homes, wearable devices, and energy management. The report then delves into the differences between IoT and traditional networks, highlighting the characteristics of IoT such as flexible human-machine interaction and wireless network extension. It explores the areas where IoT is applied, including smart homes, healthcare, and energy management. The core of the report focuses on three current security issues: privacy breaches, unauthorized access, and falsification of data. Finally, it discusses ways to mitigate these threats, such as maintaining physical device security and coding security. The report aims to provide a clear understanding of the security challenges and potential solutions within the rapidly evolving landscape of IoT.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Running head: OVERVIEW OF THE SECURITY IN THE SYSTEM
OVERVIEW OF THE SECURITY IN THE SYSTEM
Name of the Student:
Name of the University:
Author Note:
OVERVIEW OF THE SECURITY IN THE SYSTEM
Name of the Student:
Name of the University:
Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1OVERVIEW OF THE SECURITY IN THE SYSTEM
Table of Contents
Introduction......................................................................................................................................2
Review of Literature........................................................................................................................2
Characteristics of IoT compared to the traditional network:...........................................................3
Areas for application of IoT:...........................................................................................................5
Three current security issues in IoT:...............................................................................................6
Ways to mitigate the threats in the IoT security system:.................................................................7
References........................................................................................................................................9
Table of Contents
Introduction......................................................................................................................................2
Review of Literature........................................................................................................................2
Characteristics of IoT compared to the traditional network:...........................................................3
Areas for application of IoT:...........................................................................................................5
Three current security issues in IoT:...............................................................................................6
Ways to mitigate the threats in the IoT security system:.................................................................7
References........................................................................................................................................9

2OVERVIEW OF THE SECURITY IN THE SYSTEM
Introduction
The IoT is getting a vast attention as the future application of the technology from the
industries. There are many application of IoT for the personal use and industrial use. The
concept of smart cities and the smart houses can be developed with the help of IoT. This paper
has discussed the various application of the IoT along with the explanation to understand the IoT
in broader sense.
Review of Literature
Introduction to IoT:
Internet of thing is an emerging technology, which is providing a path breaking way of
delivering the goodness of technology1. The internet of things also referred as IoT is also called
internet of Everything which allows to create an environment where the machines and different
electronic devices can interact with each other automatically. The IoT is getting a vast attention
as the future application of the technology from the industries. There are many application of IoT
for the personal use and industrial use. The concept of smart cities and the smart houses can be
developed with the help of IoT. This paper has discussed the various application of the IoT along
with the explanation to understand the IoT in broader sense.
According to the paper named “Internet Of Things: Definition, Characteristics and
Architecture, Enabling Technologies, Application and Future Challenges” the IoT is a kind of
network, that helps to connect anything through the internet and provides mart solutions like
tracing, smart positioning and the recognition process2. This paper discusses about the various
application of the internet of things along with the difference between the internet of things and
Introduction
The IoT is getting a vast attention as the future application of the technology from the
industries. There are many application of IoT for the personal use and industrial use. The
concept of smart cities and the smart houses can be developed with the help of IoT. This paper
has discussed the various application of the IoT along with the explanation to understand the IoT
in broader sense.
Review of Literature
Introduction to IoT:
Internet of thing is an emerging technology, which is providing a path breaking way of
delivering the goodness of technology1. The internet of things also referred as IoT is also called
internet of Everything which allows to create an environment where the machines and different
electronic devices can interact with each other automatically. The IoT is getting a vast attention
as the future application of the technology from the industries. There are many application of IoT
for the personal use and industrial use. The concept of smart cities and the smart houses can be
developed with the help of IoT. This paper has discussed the various application of the IoT along
with the explanation to understand the IoT in broader sense.
According to the paper named “Internet Of Things: Definition, Characteristics and
Architecture, Enabling Technologies, Application and Future Challenges” the IoT is a kind of
network, that helps to connect anything through the internet and provides mart solutions like
tracing, smart positioning and the recognition process2. This paper discusses about the various
application of the internet of things along with the difference between the internet of things and

3OVERVIEW OF THE SECURITY IN THE SYSTEM
other technologies2. This paper also discusses about the characteristics and the future challenges
of IoT.
This article discusses about the smart use of the IoT. The use of IoT enables the
application of the wearable devices , home appliances and the smart device for the
communication. The focus of this paper is mainly on the security issues of the IoT devices3.
According to this paper, during the information sharing between the devices in the IoT
environment, the large amount of data contains many confidential information which are needed
to be secured. The security of the IoT system thus cannot be neglected4. The paper starts with the
general discussion about then information security background of the IoT followed by providing
the broader and more complex view of the challenges and the issues regarding the security in
IoT.
Characteristics of IoT compared to the traditional network:
The characteristics of the IoT is different from traditional system on the network
perspective. Some of the articles have mentioned the difference between the network maintained
in IoT and the traditional network system.
According to this research the comparative analysis of the IoT architecture has been
discussed. Internet of things considers the flexible interaction between the human and the
machine. In the traditional network, the interaction is done between the systems5. The IoT
allows the devices to interact with the human as well s the other devices through the use of
internet. The traditional network can be both wired and wireless, whereas, the IoT can be
considered as the extension of the wireless network6. One of the major use of IoT nowadays is
implementation of this technology in developing the smart home security system7. In smart home
other technologies2. This paper also discusses about the characteristics and the future challenges
of IoT.
This article discusses about the smart use of the IoT. The use of IoT enables the
application of the wearable devices , home appliances and the smart device for the
communication. The focus of this paper is mainly on the security issues of the IoT devices3.
According to this paper, during the information sharing between the devices in the IoT
environment, the large amount of data contains many confidential information which are needed
to be secured. The security of the IoT system thus cannot be neglected4. The paper starts with the
general discussion about then information security background of the IoT followed by providing
the broader and more complex view of the challenges and the issues regarding the security in
IoT.
Characteristics of IoT compared to the traditional network:
The characteristics of the IoT is different from traditional system on the network
perspective. Some of the articles have mentioned the difference between the network maintained
in IoT and the traditional network system.
According to this research the comparative analysis of the IoT architecture has been
discussed. Internet of things considers the flexible interaction between the human and the
machine. In the traditional network, the interaction is done between the systems5. The IoT
allows the devices to interact with the human as well s the other devices through the use of
internet. The traditional network can be both wired and wireless, whereas, the IoT can be
considered as the extension of the wireless network6. One of the major use of IoT nowadays is
implementation of this technology in developing the smart home security system7. In smart home
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4OVERVIEW OF THE SECURITY IN THE SYSTEM
security system, the presence of the intruders can be detected by the smart sensor devices and the
automated decision making software takes the actions needed to be taken based on the situation.
Sometimes the owner of the house are made aware about the violation of the security of the
house by the system. The use of this kind o system in maintaining the security of the house is
more convenient option rather than depending on the traditional system.
Another use of the IoT is RFID technology (radio frequency identification technology)
which enables the object to object communication using the radio frequency identification. RFID
can be used for various reasons. It can be a good substitute of the barcode scanning10. Through
the use of this technology one object can identify the other specific object in order to make
communication. The real time location and the identification of the object can also be done using
this technology. The flexible RFID system can be developed with the help of the IoT that allows
the merging of the function of the physical devices and the network level of the
communication11. The sensors can be used in this kind of system which will collect the relevant
data and analyze them . this analysis can bridge the gap in the human-machine communication8.
This filling of the gap cannot be achieved in the use of the traditional network communication.
The RFID technology can also be used in the case of nanotechnology an minimization of the
intelligent devices.
Another IoT device that is getting popular is smart detection system in the cars. The
smart detection and the sensors used in the car helps to detect the traffic on the road. This device
helps in the automation of the car9. The detection of the traffics in the car can be done by the
sensors without the human interactions. The smart detection system in the car also provides the
user of the car about the possible routes those can be taken and the possible congested roads. The
use of the smart devices also helps to detect the position of the car on the road along with that
security system, the presence of the intruders can be detected by the smart sensor devices and the
automated decision making software takes the actions needed to be taken based on the situation.
Sometimes the owner of the house are made aware about the violation of the security of the
house by the system. The use of this kind o system in maintaining the security of the house is
more convenient option rather than depending on the traditional system.
Another use of the IoT is RFID technology (radio frequency identification technology)
which enables the object to object communication using the radio frequency identification. RFID
can be used for various reasons. It can be a good substitute of the barcode scanning10. Through
the use of this technology one object can identify the other specific object in order to make
communication. The real time location and the identification of the object can also be done using
this technology. The flexible RFID system can be developed with the help of the IoT that allows
the merging of the function of the physical devices and the network level of the
communication11. The sensors can be used in this kind of system which will collect the relevant
data and analyze them . this analysis can bridge the gap in the human-machine communication8.
This filling of the gap cannot be achieved in the use of the traditional network communication.
The RFID technology can also be used in the case of nanotechnology an minimization of the
intelligent devices.
Another IoT device that is getting popular is smart detection system in the cars. The
smart detection and the sensors used in the car helps to detect the traffic on the road. This device
helps in the automation of the car9. The detection of the traffics in the car can be done by the
sensors without the human interactions. The smart detection system in the car also provides the
user of the car about the possible routes those can be taken and the possible congested roads. The
use of the smart devices also helps to detect the position of the car on the road along with that

5OVERVIEW OF THE SECURITY IN THE SYSTEM
this system also controls the driving speed of the car12. The use of the smart car can help to
reduce the number of accidents. The reason for being controlled by the machine and the smart
sensor , it also helps to reduce the traffic congestion in the road.
The main difference between the characteristics of IoT and the traditional network is that
the functionality of the traditional network is restricted to the computational purpose and the
communicating purpose. The characteristics of using IoT enables the smart communication
between the human and the system. Apart from that it is able to make the decision based on the
smart decision making software.
Areas for application of IoT:
The new trend of establishing the connection has gone beyond the using of Smartphone
and laptops. The advancement of the technology is helping in the advancement of the life by
making all the things those are necessary and important t for the human being connected in a
smarter way. This is done by the application of the IoT. There are various application of the IoT
such as- smart homes, using of IoT in the healthcare sector13. This article has discussed the smart
home facility. In the smart home system, the use of the IoT can help to control the different
electronic equipments in the house. The user can control these sitting far away from the house.
The security of the house is also maintained by the smart house system. However, there are some
constraints in owing a smart home14. The smart home can be expensive, as this concept is not
familiar to the most of the people and the smart system used in the smart house is expensive to
implement.
Another application of the IoT is wearable. Wearable is gaining the popularity and the
companies like Google and Samsung are working on the improvisation of these devices. These
this system also controls the driving speed of the car12. The use of the smart car can help to
reduce the number of accidents. The reason for being controlled by the machine and the smart
sensor , it also helps to reduce the traffic congestion in the road.
The main difference between the characteristics of IoT and the traditional network is that
the functionality of the traditional network is restricted to the computational purpose and the
communicating purpose. The characteristics of using IoT enables the smart communication
between the human and the system. Apart from that it is able to make the decision based on the
smart decision making software.
Areas for application of IoT:
The new trend of establishing the connection has gone beyond the using of Smartphone
and laptops. The advancement of the technology is helping in the advancement of the life by
making all the things those are necessary and important t for the human being connected in a
smarter way. This is done by the application of the IoT. There are various application of the IoT
such as- smart homes, using of IoT in the healthcare sector13. This article has discussed the smart
home facility. In the smart home system, the use of the IoT can help to control the different
electronic equipments in the house. The user can control these sitting far away from the house.
The security of the house is also maintained by the smart house system. However, there are some
constraints in owing a smart home14. The smart home can be expensive, as this concept is not
familiar to the most of the people and the smart system used in the smart house is expensive to
implement.
Another application of the IoT is wearable. Wearable is gaining the popularity and the
companies like Google and Samsung are working on the improvisation of these devices. These

6OVERVIEW OF THE SECURITY IN THE SYSTEM
kind of devices are attached with the devices used by the users. The main function of these
devices are to collect the data about the users. Those data are processed later in order to know the
insight of the users. In this way these devices help to provide the customized service to the
users15. The consumers can interact with these devices easily. The main advantage of these kind
of devices are- they are small in size and portable and these devices are low power consuming.
The use of these kind of devices can be applicable in maintaining the fitness, providing
information about the entertainment and other various fields.
IoT can also be used in the energy management. The smart sensor installed in the meter
can detect the accurate power consumption. Apart from that the main advantage of the use of the
IoT in the energy management is that the smart sensor can detect the high power consumption, at
that moment it can automatically reduces the consumption of the power16. The use of the IoT
helps to reduce the wastage of power and equal distribution of the resources.
Three current security issues in IoT:
Privacy: The main security issue present in the systems based on the IoT is maintenance
of the privacy. The data and the information can be leaked to the other people if the proper
security codes are not maintained in the system. One of the example that can be given in this
case is privacy in the use of baby monitor. Baby monitor is the application of the IoT that allows
the smart monitoring of the babies. The mothers can interact with the devices in order to monitor
their children. However, the lack of security in this device can leak the monitoring activity in
front of other people that can hamper the privacy and security off the children.
Unauthorized access: Another concerned issue regarding the use of the IoT driven system
is the threat from the unauthorized access. The data collected by the IoT and smart sensor
kind of devices are attached with the devices used by the users. The main function of these
devices are to collect the data about the users. Those data are processed later in order to know the
insight of the users. In this way these devices help to provide the customized service to the
users15. The consumers can interact with these devices easily. The main advantage of these kind
of devices are- they are small in size and portable and these devices are low power consuming.
The use of these kind of devices can be applicable in maintaining the fitness, providing
information about the entertainment and other various fields.
IoT can also be used in the energy management. The smart sensor installed in the meter
can detect the accurate power consumption. Apart from that the main advantage of the use of the
IoT in the energy management is that the smart sensor can detect the high power consumption, at
that moment it can automatically reduces the consumption of the power16. The use of the IoT
helps to reduce the wastage of power and equal distribution of the resources.
Three current security issues in IoT:
Privacy: The main security issue present in the systems based on the IoT is maintenance
of the privacy. The data and the information can be leaked to the other people if the proper
security codes are not maintained in the system. One of the example that can be given in this
case is privacy in the use of baby monitor. Baby monitor is the application of the IoT that allows
the smart monitoring of the babies. The mothers can interact with the devices in order to monitor
their children. However, the lack of security in this device can leak the monitoring activity in
front of other people that can hamper the privacy and security off the children.
Unauthorized access: Another concerned issue regarding the use of the IoT driven system
is the threat from the unauthorized access. The data collected by the IoT and smart sensor
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7OVERVIEW OF THE SECURITY IN THE SYSTEM
devices can be accessed by the unauthorized people. The collected data are confidential and
sensitive in nature. In that case, the unauthorized access of those data can become a threat for the
authorized users. One of the example can be described in order to understand the sensitivity off
this kind of vulnerability. The data collect by the IoT system in the smart car consists of user
information, the important information about the car which includes the position and the location
of the car12. Accessing these information by the intruders will be a threat for the users of the
smart car.
Falsification: The another major issue about the security of the smart system based on the
IoT is the chances of the falsification. The use of IoT can be indulged in the use of the pattern
recognition, biometric system and the iris recognization system. In these cases the falsification of
the identity can happen. The smart detection technique detect the pattern matched by the
authorized user. In some cases , the illegal access can be done with the illegal use of the pattern
of the authorized users.
Ways to mitigate the threats in the IoT security system:
The main purpose of using the IoT in the smart device is to improvise the way of
services along with the improvement of the security. Apart from the three mentioned security
vulnerabilities there are oter security threats present in the IoT. In order to mitigate those
security threats certain steps and actions can be followed.
Maintaining the physical security of the devices: Maintaining the physical security of
the connected devices are important. The devices used in the implementation of the IoT needs to
be tamper –proofing . The implementation of the remote wiping capabilities are needed to be
infused in the devices. Apart from that the developers are needed to be concerned that the
devices can be accessed by the unauthorized people. The collected data are confidential and
sensitive in nature. In that case, the unauthorized access of those data can become a threat for the
authorized users. One of the example can be described in order to understand the sensitivity off
this kind of vulnerability. The data collect by the IoT system in the smart car consists of user
information, the important information about the car which includes the position and the location
of the car12. Accessing these information by the intruders will be a threat for the users of the
smart car.
Falsification: The another major issue about the security of the smart system based on the
IoT is the chances of the falsification. The use of IoT can be indulged in the use of the pattern
recognition, biometric system and the iris recognization system. In these cases the falsification of
the identity can happen. The smart detection technique detect the pattern matched by the
authorized user. In some cases , the illegal access can be done with the illegal use of the pattern
of the authorized users.
Ways to mitigate the threats in the IoT security system:
The main purpose of using the IoT in the smart device is to improvise the way of
services along with the improvement of the security. Apart from the three mentioned security
vulnerabilities there are oter security threats present in the IoT. In order to mitigate those
security threats certain steps and actions can be followed.
Maintaining the physical security of the devices: Maintaining the physical security of
the connected devices are important. The devices used in the implementation of the IoT needs to
be tamper –proofing . The implementation of the remote wiping capabilities are needed to be
infused in the devices. Apart from that the developers are needed to be concerned that the

8OVERVIEW OF THE SECURITY IN THE SYSTEM
system will not generate the hardware malfunction and provide the access to the unauthorized
users.
Coding security: The coding security of software used in the system should be advanced
in nature. The algorithm used in the system should able to detect any abnormality in the system.
The coding standard of the system is needed to able to pass the control of the action to the
appropriate block of the execution segment after the detection of the abnormality.
Encryption: The encryption standard of the system should be well maintained so the
communication between the system and the users can not be interpreted by the third party2. This
will help to secure the system based on the IoT by maintaining the data integrity and privacy of
the system. The choosing of the encryption technology can be done after the consideration of the
system requirements and the working principal of the IoT devices.
Authentication and device identity: implementation of the proper identification and the
device authentication system in the device will help to ensure a secured connection between the
device itself and with the backend control system of the device4. This will ensure the proper and
secure workings of the device based on the IoT.
Taking these steps will ensure the security of the IoT based security devices.
Conclusion
It can be concluded from the above discussion that there are various security issues in the
systems based on the IoT. However, the implementation certain security codes can eliminate the
threats.
system will not generate the hardware malfunction and provide the access to the unauthorized
users.
Coding security: The coding security of software used in the system should be advanced
in nature. The algorithm used in the system should able to detect any abnormality in the system.
The coding standard of the system is needed to able to pass the control of the action to the
appropriate block of the execution segment after the detection of the abnormality.
Encryption: The encryption standard of the system should be well maintained so the
communication between the system and the users can not be interpreted by the third party2. This
will help to secure the system based on the IoT by maintaining the data integrity and privacy of
the system. The choosing of the encryption technology can be done after the consideration of the
system requirements and the working principal of the IoT devices.
Authentication and device identity: implementation of the proper identification and the
device authentication system in the device will help to ensure a secured connection between the
device itself and with the backend control system of the device4. This will ensure the proper and
secure workings of the device based on the IoT.
Taking these steps will ensure the security of the IoT based security devices.
Conclusion
It can be concluded from the above discussion that there are various security issues in the
systems based on the IoT. However, the implementation certain security codes can eliminate the
threats.

9OVERVIEW OF THE SECURITY IN THE SYSTEM
References
1. Hossain, Md Mahmud, Maziar Fotouhi, and Ragib Hasan. "Towards an analysis of
security issues, challenges, and open problems in the internet of things." In Services
(SERVICES), 2015 IEEE World Congress on, pp. 21-28. IEEE, 2015.
2. Chen, Edward T. "The Internet of Things: Opportunities, Issues, and Challenges." In The Internet
of Things in the Modern Business Environment, pp. 167-187. IGI Global, 2017.
3. Sicari, Sabrina, Alessandra Rizzardi, Luigi Alfredo Grieco, and Alberto Coen-Porisini. "Security,
privacy and trust in Internet of Things: The road ahead." Computer networks 76 (2015): 146-164.
4. Granjal, Jorge, Edmundo Monteiro, and Jorge Sá Silva. "Security for the internet of things: a
survey of existing protocols and open research issues." IEEE Communications Surveys &
Tutorials 17, no. 3 (2015): 1294-1312.
5. Maras, Marie-Helen. "Internet of Things: security and privacy implications." International Data
Privacy Law 5, no. 2 (2015): 99.
6. Arias, Orlando, Jacob Wurm, Khoa Hoang, and Yier Jin. "Privacy and security in internet of things
and wearable devices." IEEE Transactions on Multi-Scale Computing Systems 1, no. 2 (2015):
99-109.
7. Fernandes, Earlence, Amir Rahmati, Jaeyeon Jung, and Atul Prakash. "Security implications of
permission models in smart-home application frameworks." IEEE Security & Privacy 15, no. 2
(2017): 24-30.
8. Weber, Rolf H. "Internet of things: Privacy issues revisited." Computer Law & Security Review 31,
no. 5 (2015): 618-627.
9. Fu, Kevin, Tadayoshi Kohno, Daniel Lopresti, Elizabeth Mynatt, Klara Nahrstedt, Shwetak Patel,
Debra Richardson, and Ben Zorn. Safety, Security, and Privacy Threats Posed by Accelerating
Trends in the Internet of Things. Technical Report. Computing Community Consortium. http://cra.
org/ccc/wp-content/uploads/sites/2/2017/02/Safety-Security-and-Privacy-Threats-in-IoT. pdf,
2017.
References
1. Hossain, Md Mahmud, Maziar Fotouhi, and Ragib Hasan. "Towards an analysis of
security issues, challenges, and open problems in the internet of things." In Services
(SERVICES), 2015 IEEE World Congress on, pp. 21-28. IEEE, 2015.
2. Chen, Edward T. "The Internet of Things: Opportunities, Issues, and Challenges." In The Internet
of Things in the Modern Business Environment, pp. 167-187. IGI Global, 2017.
3. Sicari, Sabrina, Alessandra Rizzardi, Luigi Alfredo Grieco, and Alberto Coen-Porisini. "Security,
privacy and trust in Internet of Things: The road ahead." Computer networks 76 (2015): 146-164.
4. Granjal, Jorge, Edmundo Monteiro, and Jorge Sá Silva. "Security for the internet of things: a
survey of existing protocols and open research issues." IEEE Communications Surveys &
Tutorials 17, no. 3 (2015): 1294-1312.
5. Maras, Marie-Helen. "Internet of Things: security and privacy implications." International Data
Privacy Law 5, no. 2 (2015): 99.
6. Arias, Orlando, Jacob Wurm, Khoa Hoang, and Yier Jin. "Privacy and security in internet of things
and wearable devices." IEEE Transactions on Multi-Scale Computing Systems 1, no. 2 (2015):
99-109.
7. Fernandes, Earlence, Amir Rahmati, Jaeyeon Jung, and Atul Prakash. "Security implications of
permission models in smart-home application frameworks." IEEE Security & Privacy 15, no. 2
(2017): 24-30.
8. Weber, Rolf H. "Internet of things: Privacy issues revisited." Computer Law & Security Review 31,
no. 5 (2015): 618-627.
9. Fu, Kevin, Tadayoshi Kohno, Daniel Lopresti, Elizabeth Mynatt, Klara Nahrstedt, Shwetak Patel,
Debra Richardson, and Ben Zorn. Safety, Security, and Privacy Threats Posed by Accelerating
Trends in the Internet of Things. Technical Report. Computing Community Consortium. http://cra.
org/ccc/wp-content/uploads/sites/2/2017/02/Safety-Security-and-Privacy-Threats-in-IoT. pdf,
2017.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

10OVERVIEW OF THE SECURITY IN THE SYSTEM
10. Arias, Orlando, Kelvin Ly, and Yier Jin. "Security and Privacy in IoT Era." In Smart Sensors at the
IoT Frontier, pp. 351-378. Springer, Cham, 2017.
11. Watt, Steve, Chris Milne, David Bradley, David Russell, Peter Hehenberger, and Jorge Azorin-
Lopez. "Privacy Matters–Issues within Mechatronics." (2016).
12. Wurm, Jacob, Khoa Hoang, Orlando Arias, Ahmad-Reza Sadeghi, and Yier Jin. "Security
analysis on consumer and industrial iot devices." In Design Automation Conference (ASP-DAC),
2016 21st Asia and South Pacific, pp. 519-524. IEEE, 2016.
13. Abomhara, Mohamed, and Geir M. Køien. "Security and privacy in the Internet of Things: Current
status and open issues." In Privacy and Security in Mobile Systems (PRISMS), 2014 International
Conference on, pp. 1-8. IEEE, 2014.
14. Rose, Karen, Scott Eldridge, and Lyman Chapin. "The internet of things: An overview." The
Internet Society (ISOC) (2015): 1-50.
15. Bäumer, Ulrich, Sabine von Oelffen, and Miriam Keil. "Internet of Things: Legal Implications for
Every Business." In The Palgrave Handbook of Managing Continuous Business Transformation,
pp. 435-458. Palgrave Macmillan, London, 2017.
16. Caron, Xavier, Rachelle Bosua, Sean B. Maynard, and Atif Ahmad. "The Internet of Things (IoT)
and its impact on individual privacy: An Australian perspective." Computer law & security
review 32, no. 1 (2016): 4-15.
10. Arias, Orlando, Kelvin Ly, and Yier Jin. "Security and Privacy in IoT Era." In Smart Sensors at the
IoT Frontier, pp. 351-378. Springer, Cham, 2017.
11. Watt, Steve, Chris Milne, David Bradley, David Russell, Peter Hehenberger, and Jorge Azorin-
Lopez. "Privacy Matters–Issues within Mechatronics." (2016).
12. Wurm, Jacob, Khoa Hoang, Orlando Arias, Ahmad-Reza Sadeghi, and Yier Jin. "Security
analysis on consumer and industrial iot devices." In Design Automation Conference (ASP-DAC),
2016 21st Asia and South Pacific, pp. 519-524. IEEE, 2016.
13. Abomhara, Mohamed, and Geir M. Køien. "Security and privacy in the Internet of Things: Current
status and open issues." In Privacy and Security in Mobile Systems (PRISMS), 2014 International
Conference on, pp. 1-8. IEEE, 2014.
14. Rose, Karen, Scott Eldridge, and Lyman Chapin. "The internet of things: An overview." The
Internet Society (ISOC) (2015): 1-50.
15. Bäumer, Ulrich, Sabine von Oelffen, and Miriam Keil. "Internet of Things: Legal Implications for
Every Business." In The Palgrave Handbook of Managing Continuous Business Transformation,
pp. 435-458. Palgrave Macmillan, London, 2017.
16. Caron, Xavier, Rachelle Bosua, Sean B. Maynard, and Atif Ahmad. "The Internet of Things (IoT)
and its impact on individual privacy: An Australian perspective." Computer law & security
review 32, no. 1 (2016): 4-15.

11OVERVIEW OF THE SECURITY IN THE SYSTEM
1 out of 12
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.