University IoT Security and Privacy Issues in Smart Cities Research
VerifiedAdded on  2022/11/28
|23
|6142
|87
Report
AI Summary
This research paper explores the security and privacy challenges associated with the implementation of the Internet of Things (IoT) in smart cities. It examines the significance of IoT in enhancing city services and improving the lives of residents through data collection and analysis. The paper identifies various security vulnerabilities, including those related to constrained devices, weak encryption, communication technologies, and cloud layers. It also discusses the impact of human factors and legacy systems on security. The research aims to understand major security risks, mitigation techniques, and the components contributing to security issues, while also highlighting the advantages of IoT technology in smart cities. The paper outlines the research plan, including the research philosophy, approach, design, data collection procedures, sampling methods, data analysis methods, and expected outcomes. A Gantt chart provides a schedule for the research activities, and the paper concludes with a summary of the findings and references.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Running head: RESEARCH PAPER
RESEARCH PAPER: Security and Privacy issues in IoT enabled Smart Cities
[Name of the Student]
[Name of the University]
[Author note]
RESEARCH PAPER: Security and Privacy issues in IoT enabled Smart Cities
[Name of the Student]
[Name of the University]
[Author note]
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1RESEARCH PAPER
Table of Contents
Introduction:....................................................................................................................................3
Research significance:.....................................................................................................3
Research Aim:.................................................................................................................5
Research Questions:.........................................................................................................5
Research objectives:........................................................................................................5
Research Background:.....................................................................................................................6
Type of security and privacy challenges:........................................................................6
Security vulnerabilities and issues in IoT enabled Smart Cities:....................................7
Presence of constrained devices at the perception layer:.............................................7
Weak encryption:.........................................................................................................8
The integration layers communication technologies:..................................................8
Cloud Layer.................................................................................................................9
Cascade effect and the complexity of the system:.......................................................9
Software bugs:...........................................................................................................10
Equipment of the User:..............................................................................................11
Human factors:...........................................................................................................11
Legacy Systems:........................................................................................................11
Aim and Significance:...............................................................................................12
Research plan:................................................................................................................................12
Table of Contents
Introduction:....................................................................................................................................3
Research significance:.....................................................................................................3
Research Aim:.................................................................................................................5
Research Questions:.........................................................................................................5
Research objectives:........................................................................................................5
Research Background:.....................................................................................................................6
Type of security and privacy challenges:........................................................................6
Security vulnerabilities and issues in IoT enabled Smart Cities:....................................7
Presence of constrained devices at the perception layer:.............................................7
Weak encryption:.........................................................................................................8
The integration layers communication technologies:..................................................8
Cloud Layer.................................................................................................................9
Cascade effect and the complexity of the system:.......................................................9
Software bugs:...........................................................................................................10
Equipment of the User:..............................................................................................11
Human factors:...........................................................................................................11
Legacy Systems:........................................................................................................11
Aim and Significance:...............................................................................................12
Research plan:................................................................................................................................12

2RESEARCH PAPER
Outline of the Research:................................................................................................12
Research Philosophy:.....................................................................................................13
Approach of the Research..............................................................................................13
Research Design............................................................................................................14
Data Collection procedure.............................................................................................14
Sampling:.......................................................................................................................15
Data Analysis Method...................................................................................................16
Expected Results............................................................................................................16
Schedule:........................................................................................................................16
Gantt chart:....................................................................................................................17
Conclusion:....................................................................................................................................18
References:....................................................................................................................................19
Outline of the Research:................................................................................................12
Research Philosophy:.....................................................................................................13
Approach of the Research..............................................................................................13
Research Design............................................................................................................14
Data Collection procedure.............................................................................................14
Sampling:.......................................................................................................................15
Data Analysis Method...................................................................................................16
Expected Results............................................................................................................16
Schedule:........................................................................................................................16
Gantt chart:....................................................................................................................17
Conclusion:....................................................................................................................................18
References:....................................................................................................................................19

3RESEARCH PAPER
Introduction:
The implementation of eth Internet of Things device re associated with making the cities
get smarter. Smart cities are generally considered to be the communities which are associated
with building of infrastructures in a continuous way so as to improve the collection, aggregation
and use of the data (Amendola et al. 2014). This is done for the purpose of improving the lives of
the residents by means of harnessing the growing data revolution along with the sensors which
are low of cost and the collaborations in the research which is mainly done with an aim of
securing and protecting the public safety as well as individual privacy.
Practically it can be stated that the cities are associated with the usage of low-cost sensors
along with Wi-Fi enabled smart devices for the purpose of talking to the people and cities. These
IoT devices are also associated with providing the local leaders with a real-time data related to
the needs of the communication (Centenaro et al. 2016. In addition to this the city managers are
associated with the usage of the information from the IoT devices for the purpose of creating
transformational solutions for managing the cities which are crowded in a more manageable and
affordable way for everyone.
Research significance:
The smart city infrastructure associated with the IoT technology is also associated with
enabling of a more efficient as well as health boosting services for the city. IoT in smart cities
are associated with performing by usage of different kind of applications which are associated
with enabling of video surveillance, smart meters, smart parking spaces, intelligent waste
management along with environmental sensing functions and many more (Chen et al. 2014).
Experts have been associated with noting the fact that the modular end-to-end IoT solutions
Introduction:
The implementation of eth Internet of Things device re associated with making the cities
get smarter. Smart cities are generally considered to be the communities which are associated
with building of infrastructures in a continuous way so as to improve the collection, aggregation
and use of the data (Amendola et al. 2014). This is done for the purpose of improving the lives of
the residents by means of harnessing the growing data revolution along with the sensors which
are low of cost and the collaborations in the research which is mainly done with an aim of
securing and protecting the public safety as well as individual privacy.
Practically it can be stated that the cities are associated with the usage of low-cost sensors
along with Wi-Fi enabled smart devices for the purpose of talking to the people and cities. These
IoT devices are also associated with providing the local leaders with a real-time data related to
the needs of the communication (Centenaro et al. 2016. In addition to this the city managers are
associated with the usage of the information from the IoT devices for the purpose of creating
transformational solutions for managing the cities which are crowded in a more manageable and
affordable way for everyone.
Research significance:
The smart city infrastructure associated with the IoT technology is also associated with
enabling of a more efficient as well as health boosting services for the city. IoT in smart cities
are associated with performing by usage of different kind of applications which are associated
with enabling of video surveillance, smart meters, smart parking spaces, intelligent waste
management along with environmental sensing functions and many more (Chen et al. 2014).
Experts have been associated with noting the fact that the modular end-to-end IoT solutions
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4RESEARCH PAPER
provided for the smart cities are associated with including the analytic modules along with
electronic security and hosting of devices, systems and sub systems. These can as well be
harnessed into the implementation of an infrastructure which along with being fully shared
would be fully secured as well as scalable.
In addition to all this the emergence of the digital technologies have been associated with
helping the developers of the smart cities in managing the urban waste along with improving the
quality of water for the residents, easing of the congestions in the traffics, cutting down of the
pollution levels in the urban landscape, making sure of the safety of public, improving the public
good delivery along with securing a range of public assets as well as infrastructure (Chiang and
Zhang 2016). This might be associated with including the Bluetooth Low energy, 5G technology,
big data, artificial intelligence, machine learning platforms and many more.
These type of technologies when gets incorporated with the IoT infrastructure are
associated with elevating the experience of human beings in the smart city solutions (Farooq et
al. 2015). However the designers of the smart cities should necessarily be associated with
remaining consistent along with an avowed strategy across different initiatives and must be
associated with reaping down of the short-term benefits in the process of implementation.
The adaptation of the IoT is being done at a rapid speed and millions of sensors and smart
devices are getting connected to the network and are being deployed on a daily basis in offices,
home, cities and also for other purposes which are responsible for the creation of an
unprecedented opportunities related to cutting down of the costs, reducing the consumption of
energy, improving the efficiency and customer services (Gubbi et al. 2013). This helps in
understanding the ways of interacting with the environment in a better way. However this type of
provided for the smart cities are associated with including the analytic modules along with
electronic security and hosting of devices, systems and sub systems. These can as well be
harnessed into the implementation of an infrastructure which along with being fully shared
would be fully secured as well as scalable.
In addition to all this the emergence of the digital technologies have been associated with
helping the developers of the smart cities in managing the urban waste along with improving the
quality of water for the residents, easing of the congestions in the traffics, cutting down of the
pollution levels in the urban landscape, making sure of the safety of public, improving the public
good delivery along with securing a range of public assets as well as infrastructure (Chiang and
Zhang 2016). This might be associated with including the Bluetooth Low energy, 5G technology,
big data, artificial intelligence, machine learning platforms and many more.
These type of technologies when gets incorporated with the IoT infrastructure are
associated with elevating the experience of human beings in the smart city solutions (Farooq et
al. 2015). However the designers of the smart cities should necessarily be associated with
remaining consistent along with an avowed strategy across different initiatives and must be
associated with reaping down of the short-term benefits in the process of implementation.
The adaptation of the IoT is being done at a rapid speed and millions of sensors and smart
devices are getting connected to the network and are being deployed on a daily basis in offices,
home, cities and also for other purposes which are responsible for the creation of an
unprecedented opportunities related to cutting down of the costs, reducing the consumption of
energy, improving the efficiency and customer services (Gubbi et al. 2013). This helps in
understanding the ways of interacting with the environment in a better way. However this type of

5RESEARCH PAPER
added utility is associated with its own set of caveats as well as requirements and all this needs to
be addressed by adaptation of a proper solution or approach.
Research Aim:
One of the major aspect of the smart cities is associated with including the security.
Smart cities are associated with relying upon the constant connectivity to the volume of data
which are received from the stationary as well as from the moving sensor. Once the data are
received they are converted into useful information by making use of the data analytics so as to
provide a life of better quality (He, Yan and Da Xu 2014). Failure in securing the data and when
the data gets into the wrong hands then it can cause extreme damage and might be associated
with leading to catastrophic events. Concerns would no longer be considered to be limited to the
protection of the sensitive information and assets. This research would entirely be aimed at the
IoT in smart cities security.
Research Questions:
Q1. What are the major security risks that are faced by the IoT enabled Smart cities?
Q2. What are the techniques by which the risks can be mitigated?
Q3. What are the major components responsible for putting forward of the security
issues?
Q4. What are the major advantages of using the IoT technology in the Smart cities?
Research objectives:
The objectives of the research have been listed below:
ď‚· To understand the major security challenges faced by the IoT enabled smart cities
added utility is associated with its own set of caveats as well as requirements and all this needs to
be addressed by adaptation of a proper solution or approach.
Research Aim:
One of the major aspect of the smart cities is associated with including the security.
Smart cities are associated with relying upon the constant connectivity to the volume of data
which are received from the stationary as well as from the moving sensor. Once the data are
received they are converted into useful information by making use of the data analytics so as to
provide a life of better quality (He, Yan and Da Xu 2014). Failure in securing the data and when
the data gets into the wrong hands then it can cause extreme damage and might be associated
with leading to catastrophic events. Concerns would no longer be considered to be limited to the
protection of the sensitive information and assets. This research would entirely be aimed at the
IoT in smart cities security.
Research Questions:
Q1. What are the major security risks that are faced by the IoT enabled Smart cities?
Q2. What are the techniques by which the risks can be mitigated?
Q3. What are the major components responsible for putting forward of the security
issues?
Q4. What are the major advantages of using the IoT technology in the Smart cities?
Research objectives:
The objectives of the research have been listed below:
ď‚· To understand the major security challenges faced by the IoT enabled smart cities

6RESEARCH PAPER
ď‚· To understand the techniques used for eliminating or mitigating the security issues
ď‚· To identify the major reason laying the being the security issues
ď‚· To understand the advantages of IoT technology in the smart cities.
Research Background:
Smart cities cannot be considered to be smart unless and until these are capable of
providing the required level of security. General security and privacy of the requirements is
associated with including of making sure that the availability, integrity along with access control,
confidentiality and the nonrepudiation. The smart cities are associated with harnessing of the
data which are sensed from the physical spaces which are seen to be associated with containing
the granular details related to the people who are living in this environments (Huh, Cho and Kim
2017). The journey of the data is seen to be starting from the sensor nodes and generally ends up
at the user application. For this reason the smart city is seen to be posing an unique security
requirements and the reason behind this is that the systems consists of interlinked systems which
are associated with sharing of data with one another. This is the key argument which is
responsible for discouraging the wide spread usage of the smart city services.
Type of security and privacy challenges:
The security requirements of the IoT enabled smart cities can be categorized into two
different categories. The operational security requirements is associated with ensuring the fact
that the technology and the infrastructure which has been employed is secure along with being
immune to any type of cyber-attacks (Kelly, Suryadevara and Mukhopadhyay 2013). The second
aspect of the security is associated with dealing with the data which are generated and are
communicated within the infrastructure which are associated with the usage of different kind of
technologies. Despite of all this the data security along with the protection is seen to be
ď‚· To understand the techniques used for eliminating or mitigating the security issues
ď‚· To identify the major reason laying the being the security issues
ď‚· To understand the advantages of IoT technology in the smart cities.
Research Background:
Smart cities cannot be considered to be smart unless and until these are capable of
providing the required level of security. General security and privacy of the requirements is
associated with including of making sure that the availability, integrity along with access control,
confidentiality and the nonrepudiation. The smart cities are associated with harnessing of the
data which are sensed from the physical spaces which are seen to be associated with containing
the granular details related to the people who are living in this environments (Huh, Cho and Kim
2017). The journey of the data is seen to be starting from the sensor nodes and generally ends up
at the user application. For this reason the smart city is seen to be posing an unique security
requirements and the reason behind this is that the systems consists of interlinked systems which
are associated with sharing of data with one another. This is the key argument which is
responsible for discouraging the wide spread usage of the smart city services.
Type of security and privacy challenges:
The security requirements of the IoT enabled smart cities can be categorized into two
different categories. The operational security requirements is associated with ensuring the fact
that the technology and the infrastructure which has been employed is secure along with being
immune to any type of cyber-attacks (Kelly, Suryadevara and Mukhopadhyay 2013). The second
aspect of the security is associated with dealing with the data which are generated and are
communicated within the infrastructure which are associated with the usage of different kind of
technologies. Despite of all this the data security along with the protection is seen to be
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7RESEARCH PAPER
dependent upon the operational security as anyone who would be breaking into the system would
become capable of violating the data access policy.
Security vulnerabilities and issues in IoT enabled Smart Cities:
The system security vulnerability is associated with defining the security holes which can
because of the numerous issues which includes the weak encryption, human errors and many
more (Khan and Salah 2018). This type of issues faced by the smart cities are generally seen to
be aggravated by the sensors which are physical dispersed in the public spaces as well as by the
multifold complexities existing in the system and the interdependencies which exists between its
components which is associated with making it more vulnerable to different kind of cyber-
attacks. Below are the listed some of the major security issues faced by the IoT Smart cities.
Presence of constrained devices at the perception layer:
Internet of things is associated with connecting all the RFID tags along with the sensor
devices to the internet. RFID dependent objects are generally considered to be passive and the
reason behind this is that they generally requires a reader along with a gateway so as to get
connected to the internet for example the smart cards which are used by the transport systems.
Contrarily the sensor devices are associated with including sensors along with actuators and
microcontrollers (Kolias et al. 2017). In today’s world there exists different kind of sensors
which are capable sensing the diverse phenomenon like the humidity, velocity, location and
many more. In addition to this the traditional dumb devices such as the electronic devices along
with the doors and lights are associated with notifying and are being remotely controlled by the
users. Moreover these sensor devices ate constrained in the resources and are seen to be lacking
an efficient security or privacy mechanism. This in turn is associated with making the devices
dependent upon the operational security as anyone who would be breaking into the system would
become capable of violating the data access policy.
Security vulnerabilities and issues in IoT enabled Smart Cities:
The system security vulnerability is associated with defining the security holes which can
because of the numerous issues which includes the weak encryption, human errors and many
more (Khan and Salah 2018). This type of issues faced by the smart cities are generally seen to
be aggravated by the sensors which are physical dispersed in the public spaces as well as by the
multifold complexities existing in the system and the interdependencies which exists between its
components which is associated with making it more vulnerable to different kind of cyber-
attacks. Below are the listed some of the major security issues faced by the IoT Smart cities.
Presence of constrained devices at the perception layer:
Internet of things is associated with connecting all the RFID tags along with the sensor
devices to the internet. RFID dependent objects are generally considered to be passive and the
reason behind this is that they generally requires a reader along with a gateway so as to get
connected to the internet for example the smart cards which are used by the transport systems.
Contrarily the sensor devices are associated with including sensors along with actuators and
microcontrollers (Kolias et al. 2017). In today’s world there exists different kind of sensors
which are capable sensing the diverse phenomenon like the humidity, velocity, location and
many more. In addition to this the traditional dumb devices such as the electronic devices along
with the doors and lights are associated with notifying and are being remotely controlled by the
users. Moreover these sensor devices ate constrained in the resources and are seen to be lacking
an efficient security or privacy mechanism. This in turn is associated with making the devices

8RESEARCH PAPER
prone to the risk of being hacked and is associated with opening up of ports for different kind of
security risks.
Weak encryption:
Encryption is considered to be traditional way for securing the networked software
devices and it is generally believed that the encrypted channels ate associated with making sure
of the fact that the system is protected against the attackers. Besides this the current smart city
initiatives are associated with deployment of systems without conducting any kind of tests
related to the cyber-security threats (Lazarescu 2013). Despite of all this it is very important
aspect which the IoT enabled Smart cities are having where most of the IoT devices are having
constraints and are not capable of supporting the viable links which are encrypted. Moreover the
encrypted links are also prone to the other security issues and the reason behind this is that the
attackers are still capable of breaking into the encrypted systems by making use of the side
channels as well as by making use of the clod boot attacks. This issues are generally associated
with acting as one of the major hurdle in the way of wide acceptance of the smart city systems.
The integration layers communication technologies:
There exists different kind of communication technologies which are seen to be used by
the various kind of IoT devices and this depends upon their capabilities. This technologies are
mainly associated with including the RFID, Bluetooth NFC, ZigBee, BLE and 6LoWPAN which
is based upon the IEEE802.15.4, Wi-Fi, LPWAN, and the 3G & 4G mobile technologies (Lee
and Lee 2015). All these technologies are seen to be having security vulnerabilities which are
associated with making them susceptible to being hijacked. Moreover the most sophisticated
technologies for example the 4G mobile technologies are seen to be having vulnerabilities
associated with its infrastructure.
prone to the risk of being hacked and is associated with opening up of ports for different kind of
security risks.
Weak encryption:
Encryption is considered to be traditional way for securing the networked software
devices and it is generally believed that the encrypted channels ate associated with making sure
of the fact that the system is protected against the attackers. Besides this the current smart city
initiatives are associated with deployment of systems without conducting any kind of tests
related to the cyber-security threats (Lazarescu 2013). Despite of all this it is very important
aspect which the IoT enabled Smart cities are having where most of the IoT devices are having
constraints and are not capable of supporting the viable links which are encrypted. Moreover the
encrypted links are also prone to the other security issues and the reason behind this is that the
attackers are still capable of breaking into the encrypted systems by making use of the side
channels as well as by making use of the clod boot attacks. This issues are generally associated
with acting as one of the major hurdle in the way of wide acceptance of the smart city systems.
The integration layers communication technologies:
There exists different kind of communication technologies which are seen to be used by
the various kind of IoT devices and this depends upon their capabilities. This technologies are
mainly associated with including the RFID, Bluetooth NFC, ZigBee, BLE and 6LoWPAN which
is based upon the IEEE802.15.4, Wi-Fi, LPWAN, and the 3G & 4G mobile technologies (Lee
and Lee 2015). All these technologies are seen to be having security vulnerabilities which are
associated with making them susceptible to being hijacked. Moreover the most sophisticated
technologies for example the 4G mobile technologies are seen to be having vulnerabilities
associated with its infrastructure.

9RESEARCH PAPER
Cloud Layer
The cloud layer is generally associated with providing of the required flexibility for the
purpose of supporting the scalability feature of the smart cities, but the cloud systems are seen to
be having security issues like the outsourcing, multi-tenancy and along with this the massive data
which is seen to be associated with requiring intense computation. Outsourcing is also seen to be
requiring the need of providing remote access which is associated with resulting in having a less
control upon the data and is eventually responsible for causing insecurity as well as privacy
violations. It is possible to deal with this by making sure of the fact that the cloud provider is
trust worthy along with making sure that the data which is outsourced is verifiable in terms of the
security and privacy (Madakam, Ramaswamy and Tripathi 2015). Multi-tenancy is associated
with enabling of the multiple users for the purpose of using the cloud platforms. The clouds ate
also capable of using the different allocation of the resource policies for storing the data of
different users in a single physical machine, for this reason the multi-tenancy is associated with
posing various kind of security vulnerabilities. Another major aspect of the cloud computing is
associated with including the traditional security techniques and this is generally seen to be
requiring heavy communication or computing overheads for the purpose of dealing with the
massive amount of data in the clouds. The overhead is seen to be becoming infeasible for
example in cases related to the hashing of the entire data set which is stored remotely.
Cascade effect and the complexity of the system:
The systems existing the smart cities are of large scale and are seen to be complex which
is seen to be associated with containing heterogeneous networks along with devices. The smart
city architectures ate seen to be consisting of multiple layers and each of the layer is seen to be
consisting of plethora of devices as well as technologies. Besides this the web of
Cloud Layer
The cloud layer is generally associated with providing of the required flexibility for the
purpose of supporting the scalability feature of the smart cities, but the cloud systems are seen to
be having security issues like the outsourcing, multi-tenancy and along with this the massive data
which is seen to be associated with requiring intense computation. Outsourcing is also seen to be
requiring the need of providing remote access which is associated with resulting in having a less
control upon the data and is eventually responsible for causing insecurity as well as privacy
violations. It is possible to deal with this by making sure of the fact that the cloud provider is
trust worthy along with making sure that the data which is outsourced is verifiable in terms of the
security and privacy (Madakam, Ramaswamy and Tripathi 2015). Multi-tenancy is associated
with enabling of the multiple users for the purpose of using the cloud platforms. The clouds ate
also capable of using the different allocation of the resource policies for storing the data of
different users in a single physical machine, for this reason the multi-tenancy is associated with
posing various kind of security vulnerabilities. Another major aspect of the cloud computing is
associated with including the traditional security techniques and this is generally seen to be
requiring heavy communication or computing overheads for the purpose of dealing with the
massive amount of data in the clouds. The overhead is seen to be becoming infeasible for
example in cases related to the hashing of the entire data set which is stored remotely.
Cascade effect and the complexity of the system:
The systems existing the smart cities are of large scale and are seen to be complex which
is seen to be associated with containing heterogeneous networks along with devices. The smart
city architectures ate seen to be consisting of multiple layers and each of the layer is seen to be
consisting of plethora of devices as well as technologies. Besides this the web of
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

10RESEARCH PAPER
interdependencies which are seen to be existing between its components as well as with the other
systems as associated with posing a huge challenge for the measures as well as the for the
mitigation processes of the risks in the presence of numerous stakeholders (Tao et al. 2014).
Besides this the multiple links which are seen to eb existing between the system components are
associated with exposing them to the security risks even if all the systems are secured in an
independent way, in addition to this the interdependencies are also seen to be turning out as a
major issue in the process of maintaining or upgrading the interface of the components of the
system. Moreover the highly interconnected components are also seen to be probe to the creation
of the cascade effects where one attack on a system is associated with having a severe affect
upon the other systems as well. Thus security risks are in turn associated with posing a huge
challenge in the realization of the smart city where one of the successful attacks is capable of
down the entire system of the smart city management.
Software bugs:
Along with the above stated security risks the devices which are software based might
also become vulnerable to the cyber-attacks and the main reason behind this is the existence of
the software bugs which are associated with leaving a hole for the attackers to sneak into the
system, this particular factor is further associated with getting intensified in the complex systems
which are seen to consisting of millions of lines of code (Tukker et al. 2013). This is the
particular space where the bugs are associated with opening up of backdoors for the attackers.
Once the attacker archives success in getting into the system of the smart cities then the attacker
would be gaining an entire control over the systems and would be associated with the
exploitation of the data which are available.
interdependencies which are seen to be existing between its components as well as with the other
systems as associated with posing a huge challenge for the measures as well as the for the
mitigation processes of the risks in the presence of numerous stakeholders (Tao et al. 2014).
Besides this the multiple links which are seen to eb existing between the system components are
associated with exposing them to the security risks even if all the systems are secured in an
independent way, in addition to this the interdependencies are also seen to be turning out as a
major issue in the process of maintaining or upgrading the interface of the components of the
system. Moreover the highly interconnected components are also seen to be probe to the creation
of the cascade effects where one attack on a system is associated with having a severe affect
upon the other systems as well. Thus security risks are in turn associated with posing a huge
challenge in the realization of the smart city where one of the successful attacks is capable of
down the entire system of the smart city management.
Software bugs:
Along with the above stated security risks the devices which are software based might
also become vulnerable to the cyber-attacks and the main reason behind this is the existence of
the software bugs which are associated with leaving a hole for the attackers to sneak into the
system, this particular factor is further associated with getting intensified in the complex systems
which are seen to consisting of millions of lines of code (Tukker et al. 2013). This is the
particular space where the bugs are associated with opening up of backdoors for the attackers.
Once the attacker archives success in getting into the system of the smart cities then the attacker
would be gaining an entire control over the systems and would be associated with the
exploitation of the data which are available.

11RESEARCH PAPER
Equipment of the User:
Numerous users existing in the smart cities are capable of consuming the value added
services and participate in the crowd sensing by making use of their mobile devices which are
seen to be prone to different kind of the vulnerabilities. At first each of the mobile phone are
capable of being identified by making use of the unique IMEI code. This IEMI codes are
generally related to the owner of the phone so as to get their personal information and can also be
used for the purpose of tracking the mobile device as well (Wang et al. 2016). In addition to this
there exists many users who are seen to be having a reckless behaviors towards providing of
permission access to the malicious applications. And once these malicious applications gets the
permission they would become capable of accessing the information of the user along with
gaining a control over the device.
Human factors:
The IoT enabled smart cities are hardly allowed to fully operate in an autonomous way and the
main reason behind this is that if they are fully allowed to operate in an autonomous way then
they would be associated with the creation of a Kafkaesque situation. For this reason the humans
are almost always kept in a loop of decision making along with some their interactions
conducted with the smart city systems (Zhang et al. 2014). The errors conducted by humans
either in a deliberate way or by mistake would be resulting in the leakage of the data or
malfunctioning of the entire system. There exists numerous way by which the users of the smart
city can sabotage the entire system.
Legacy Systems:
The legacy systems are seen to be existing everywhere and most of the authorities are
seen to be requiring the integration of the infrastructure which is already existing with the smart
Equipment of the User:
Numerous users existing in the smart cities are capable of consuming the value added
services and participate in the crowd sensing by making use of their mobile devices which are
seen to be prone to different kind of the vulnerabilities. At first each of the mobile phone are
capable of being identified by making use of the unique IMEI code. This IEMI codes are
generally related to the owner of the phone so as to get their personal information and can also be
used for the purpose of tracking the mobile device as well (Wang et al. 2016). In addition to this
there exists many users who are seen to be having a reckless behaviors towards providing of
permission access to the malicious applications. And once these malicious applications gets the
permission they would become capable of accessing the information of the user along with
gaining a control over the device.
Human factors:
The IoT enabled smart cities are hardly allowed to fully operate in an autonomous way and the
main reason behind this is that if they are fully allowed to operate in an autonomous way then
they would be associated with the creation of a Kafkaesque situation. For this reason the humans
are almost always kept in a loop of decision making along with some their interactions
conducted with the smart city systems (Zhang et al. 2014). The errors conducted by humans
either in a deliberate way or by mistake would be resulting in the leakage of the data or
malfunctioning of the entire system. There exists numerous way by which the users of the smart
city can sabotage the entire system.
Legacy Systems:
The legacy systems are seen to be existing everywhere and most of the authorities are
seen to be requiring the integration of the infrastructure which is already existing with the smart

12RESEARCH PAPER
city infrastructure. Most of the legacy systems are seen to be insecure and have been created
almost decades ago without taking into consideration the account of the security challenges
existing in today’s world (Xu, Wendt and Potkonjak 2014). These type of legacy systems are not
upgraded on a regular basis and have been associated with inheriting the vulnerabilities which in
turn is responsible for providing of a freeway for the attackers. Besides this it is also very
essential to make sure that the new smart city systems are regularly being patched up with the
new security features.
Aim and Significance:
The main aim of this paper is to analyze the different kind of threats and security issues
which are associated with the IoT enabled Smart cities along with understanding the ways how
the security issues can be minimized. The entire research when completed would be helping in
understanding the different kind of security threats which are faced by the IoT enabled smart
cities (Zhao and Ge 2013). The research would also be helping in investigating the various type
of advantages which are put forward because of using the IoT by the smart cities. In addition to
this all the challenges which are faced by the organizations would also be analyzed in a proper
way. The research would also be helping in recommending certain precautions which are
necessary for eliminating or minimizing the security challenges as well.
Research plan:
Outline of the Research:
The research study will be conducted based on the previous literature review in the area
of the cloud computing uses and the current data. The philosophy that will be used in the
research study is the positivism philosophy. Both the social and scientific data will be considered
city infrastructure. Most of the legacy systems are seen to be insecure and have been created
almost decades ago without taking into consideration the account of the security challenges
existing in today’s world (Xu, Wendt and Potkonjak 2014). These type of legacy systems are not
upgraded on a regular basis and have been associated with inheriting the vulnerabilities which in
turn is responsible for providing of a freeway for the attackers. Besides this it is also very
essential to make sure that the new smart city systems are regularly being patched up with the
new security features.
Aim and Significance:
The main aim of this paper is to analyze the different kind of threats and security issues
which are associated with the IoT enabled Smart cities along with understanding the ways how
the security issues can be minimized. The entire research when completed would be helping in
understanding the different kind of security threats which are faced by the IoT enabled smart
cities (Zhao and Ge 2013). The research would also be helping in investigating the various type
of advantages which are put forward because of using the IoT by the smart cities. In addition to
this all the challenges which are faced by the organizations would also be analyzed in a proper
way. The research would also be helping in recommending certain precautions which are
necessary for eliminating or minimizing the security challenges as well.
Research plan:
Outline of the Research:
The research study will be conducted based on the previous literature review in the area
of the cloud computing uses and the current data. The philosophy that will be used in the
research study is the positivism philosophy. Both the social and scientific data will be considered
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

13RESEARCH PAPER
to understand the present condition of the cloud computing uses in the business organizations.
Deductive approach will be used in the study as the research approach and the analytical design
will be used as the research design of this study (Verma et al. 2017). Primary and secondary both
of these two types of data will be used in this research work. In the primary data, both the
quantitative and qualitative data will be collected and analyzed.
Research Philosophy:
There are two types of research philosophy namely, positivism and interpretivism. The
interpretivism philosophy deals with conducting the research analysis by following scientific
data only. In this particular philosophy human involvement associated with the research is not
defined or described. There are two different types of research methods are found to be
exceptionally prominent to lead scholastic research study. The positivism investigation theory
incorporates viewing as well as perceiving certified affirmations as well as clarifications and thus
separates the enquiry problems related with them (Lee, Choi and Kim 2017). The researcher
achieved positivism by appraising the available information as well as break down examination
problems which is indicated by truths, verification recorded and bona fide realities. The
interpretivism theory is similar to positivism as it draws the problems in people’s own perception
as well as determinations on the specific scene or condition. This operation will be operated
considering the positivism where logical methods will be used as part of social research.
Approach of the Research
Two important research approaches were used for composition works, they are inductive
and deductive. The deductive approach is the important approach in research go as it achieves
to understand the present condition of the cloud computing uses in the business organizations.
Deductive approach will be used in the study as the research approach and the analytical design
will be used as the research design of this study (Verma et al. 2017). Primary and secondary both
of these two types of data will be used in this research work. In the primary data, both the
quantitative and qualitative data will be collected and analyzed.
Research Philosophy:
There are two types of research philosophy namely, positivism and interpretivism. The
interpretivism philosophy deals with conducting the research analysis by following scientific
data only. In this particular philosophy human involvement associated with the research is not
defined or described. There are two different types of research methods are found to be
exceptionally prominent to lead scholastic research study. The positivism investigation theory
incorporates viewing as well as perceiving certified affirmations as well as clarifications and thus
separates the enquiry problems related with them (Lee, Choi and Kim 2017). The researcher
achieved positivism by appraising the available information as well as break down examination
problems which is indicated by truths, verification recorded and bona fide realities. The
interpretivism theory is similar to positivism as it draws the problems in people’s own perception
as well as determinations on the specific scene or condition. This operation will be operated
considering the positivism where logical methods will be used as part of social research.
Approach of the Research
Two important research approaches were used for composition works, they are inductive
and deductive. The deductive approach is the important approach in research go as it achieves

14RESEARCH PAPER
profits many information utilizing the top-base approach as well as involves someone to review
flow composing (Alansari et al. 2018). The inductive approach is superior approach used in the
research works. Here, innovative theories and layout are developed. It enhances the examinations
in the fundamental period of investigation with the specific objective of incrementing the
sensitive information. The requirements develop imperative theory such that the other
speculation is enhanced.
In this situation, the deductive approach is applicable where the different truths and
implementation of concerned technology as well as their related problems will be found. In this
research, the project members will not develop new layout or theories.
Research Design
There are three different sorts of designs for research work, they are descriptive,
exploratory and explanatory research designs. The exploratory design deals with engaging
researcher in the creation of information of the topic. Expressive outline is one of the
predominant frameworks in case when research objectives are clearly understood at the
beginning of the research. The insights and the occurrence of issues are clearly understood in the
beginning of research work (Kumar 2019). On the other hand some other peoples recommend
spellbinding outline to finish the research work. In this particular case, researcher will use
descriptive research design which use some existing theories and literature to conduct the
research analysis.
Data Collection procedure
Data can be classified as two types primary as well as secondary. Information will play
an important role in completing the project. The data can be collected from the people,
profits many information utilizing the top-base approach as well as involves someone to review
flow composing (Alansari et al. 2018). The inductive approach is superior approach used in the
research works. Here, innovative theories and layout are developed. It enhances the examinations
in the fundamental period of investigation with the specific objective of incrementing the
sensitive information. The requirements develop imperative theory such that the other
speculation is enhanced.
In this situation, the deductive approach is applicable where the different truths and
implementation of concerned technology as well as their related problems will be found. In this
research, the project members will not develop new layout or theories.
Research Design
There are three different sorts of designs for research work, they are descriptive,
exploratory and explanatory research designs. The exploratory design deals with engaging
researcher in the creation of information of the topic. Expressive outline is one of the
predominant frameworks in case when research objectives are clearly understood at the
beginning of the research. The insights and the occurrence of issues are clearly understood in the
beginning of research work (Kumar 2019). On the other hand some other peoples recommend
spellbinding outline to finish the research work. In this particular case, researcher will use
descriptive research design which use some existing theories and literature to conduct the
research analysis.
Data Collection procedure
Data can be classified as two types primary as well as secondary. Information will play
an important role in completing the project. The data can be collected from the people,

15RESEARCH PAPER
examination region or from other sources (Silverman 2016)). Auxiliary data can be defined as
the data that are collected from diaries, yearly reports or newspaper (Flick 2015). In this
particular project plan, the required information will be collected to satisfy the objective of the
research. Information can be divided in two various forms depending on the form of the
accessibility, they are quantitative and subjective information.
In this particular case, the primary data will be gathered from peoples who are related to
the business organization which utilizes the different IoT devices. Two types of data are required
for the research namely, quantitative and qualitative. The quantitative data are gathered by
survey that are to be answered or responded by the people of the organization who are using IoT
in their organization (Bresler and Stake 2017). Some information will be collected from the
meeting that will be held between the operational executive and the IT chiefs associated with the
business.
Sampling:
It is a technique of selecting an objective to gather the data used for research
contemplates. The inspecting methods can be of two different types, namely, likelihood testing
technique and non-likelihood research technique (Fletcher 2017). In likelihood research
technique everyone achieves a same level of requirements that is to be chosen. Objective
populace can be chosen in various ways but in this case the analyst technique will be used to
determine the objective populace.
In this research, the researcher will use both the sampling techniques. In likelihood
research technique arbitrary determination method will used to choose the objective populace
and non-likelihood technique will be utilized to choose the chiefs for meeting (Walliman 2017).
examination region or from other sources (Silverman 2016)). Auxiliary data can be defined as
the data that are collected from diaries, yearly reports or newspaper (Flick 2015). In this
particular project plan, the required information will be collected to satisfy the objective of the
research. Information can be divided in two various forms depending on the form of the
accessibility, they are quantitative and subjective information.
In this particular case, the primary data will be gathered from peoples who are related to
the business organization which utilizes the different IoT devices. Two types of data are required
for the research namely, quantitative and qualitative. The quantitative data are gathered by
survey that are to be answered or responded by the people of the organization who are using IoT
in their organization (Bresler and Stake 2017). Some information will be collected from the
meeting that will be held between the operational executive and the IT chiefs associated with the
business.
Sampling:
It is a technique of selecting an objective to gather the data used for research
contemplates. The inspecting methods can be of two different types, namely, likelihood testing
technique and non-likelihood research technique (Fletcher 2017). In likelihood research
technique everyone achieves a same level of requirements that is to be chosen. Objective
populace can be chosen in various ways but in this case the analyst technique will be used to
determine the objective populace.
In this research, the researcher will use both the sampling techniques. In likelihood
research technique arbitrary determination method will used to choose the objective populace
and non-likelihood technique will be utilized to choose the chiefs for meeting (Walliman 2017).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

16RESEARCH PAPER
Specialist will choose the administrators depending on the experience and various skills of
leading a discussion.
Data Analysis Method
The research will be completed by the qualitative and quantitative data that are collected
in the data collected method. Data that are gathered form the surveys or the meeting will be
critically analyzed and will be deeply compared with the data that are collected from literary
sources. The conclusion of the interviews or the results will also be analyzed and then researcher
will locate that the research objective is met or not (McCusker and Gunaydin 2015). The
quantitative data will be analyzed using the Microsoft Excel software which help the researcher
to locate the differences between the qualitative and quantitative data.
Expected Results
The expected results of this research deals with the various issues faced by the
organizations which uses IoT devices in their organization to control various business operations
(Brannen 2017). The literature of research will enhance the understanding of the possible threats
related to the IoT technology and the data analysis method will enhance the understanding of
present situation of the research work. The outcomes of the research will help to make the city
smarter by implementing IoT devices
Schedule:
Task
Mode Task Name Duration Start Finish Predecessors
Auto
Schedu
led
Research Project 36 mons Mon
5/27/19
Fri
2/25/22
Auto
Schedu
led
Research Proposal 16.15
mons
Mon
5/27/19
Wed
8/19/20
Auto Choosing a topic for research 10 days Mon Fri 6/7/19
Specialist will choose the administrators depending on the experience and various skills of
leading a discussion.
Data Analysis Method
The research will be completed by the qualitative and quantitative data that are collected
in the data collected method. Data that are gathered form the surveys or the meeting will be
critically analyzed and will be deeply compared with the data that are collected from literary
sources. The conclusion of the interviews or the results will also be analyzed and then researcher
will locate that the research objective is met or not (McCusker and Gunaydin 2015). The
quantitative data will be analyzed using the Microsoft Excel software which help the researcher
to locate the differences between the qualitative and quantitative data.
Expected Results
The expected results of this research deals with the various issues faced by the
organizations which uses IoT devices in their organization to control various business operations
(Brannen 2017). The literature of research will enhance the understanding of the possible threats
related to the IoT technology and the data analysis method will enhance the understanding of
present situation of the research work. The outcomes of the research will help to make the city
smarter by implementing IoT devices
Schedule:
Task
Mode Task Name Duration Start Finish Predecessors
Auto
Schedu
led
Research Project 36 mons Mon
5/27/19
Fri
2/25/22
Auto
Schedu
led
Research Proposal 16.15
mons
Mon
5/27/19
Wed
8/19/20
Auto Choosing a topic for research 10 days Mon Fri 6/7/19

17RESEARCH PAPER
Schedul
ed 5/27/19
Auto
Schedul
ed
Background Study of the
Research 120 days Mon
6/10/19
Fri
11/22/19 3
Auto
Schedul
ed
Development of the Research
Question 20 days Mon
11/25/19
Fri
12/20/19 4
Auto
Schedul
ed
Designing the Conceptual
Framework 150 days Mon
12/23/19
Fri
7/17/20 5
Auto
Schedul
ed
Development of the Research
Question 20 days Mon
7/20/20
Fri
8/14/20 6
Auto
Schedul
ed
Research Proposal Submission 3 days Mon
8/17/20
Wed
8/19/20 7
Auto
Schedu
led
Review of the Literature and
Collection of the Data
8.35
mons
Thu
8/20/20
Fri
4/9/21
Auto
Schedul
ed
Reviewing the available
literature 2 mons Thu
8/20/20
Wed
10/14/20 8
Auto
Schedul
ed
Selecting target population for
collecting the data 80 days Thu
10/15/20
Wed
2/3/21 10
Auto
Schedul
ed
Collecting the Data of the
Research Study 15 days Thu
2/4/21
Wed
2/24/21 11
Auto
Schedul
ed
Analysing the gathered data 30 days Thu
2/25/21
Wed
4/7/21 12
Auto
Schedul
ed
Submission of the Draft
Research paper 2 days Thu
4/8/21 Fri 4/9/21 13
Auto
Schedu
led
Submission of the Final Project
Paper
11.5
mons
Mon
4/12/21
Fri
2/25/22
Auto
Schedul
ed
Critical Analysis of the findings 150 days Mon
4/12/21
Fri
11/5/21 14
Auto
Schedul
ed
Concluding the Findings of the
Study 60 days Mon
11/8/21
Fri
1/28/22 16
Auto
Schedul
ed
Recommendations 20 days Mon
1/31/22
Fri
2/25/22 17
Schedul
ed 5/27/19
Auto
Schedul
ed
Background Study of the
Research 120 days Mon
6/10/19
Fri
11/22/19 3
Auto
Schedul
ed
Development of the Research
Question 20 days Mon
11/25/19
Fri
12/20/19 4
Auto
Schedul
ed
Designing the Conceptual
Framework 150 days Mon
12/23/19
Fri
7/17/20 5
Auto
Schedul
ed
Development of the Research
Question 20 days Mon
7/20/20
Fri
8/14/20 6
Auto
Schedul
ed
Research Proposal Submission 3 days Mon
8/17/20
Wed
8/19/20 7
Auto
Schedu
led
Review of the Literature and
Collection of the Data
8.35
mons
Thu
8/20/20
Fri
4/9/21
Auto
Schedul
ed
Reviewing the available
literature 2 mons Thu
8/20/20
Wed
10/14/20 8
Auto
Schedul
ed
Selecting target population for
collecting the data 80 days Thu
10/15/20
Wed
2/3/21 10
Auto
Schedul
ed
Collecting the Data of the
Research Study 15 days Thu
2/4/21
Wed
2/24/21 11
Auto
Schedul
ed
Analysing the gathered data 30 days Thu
2/25/21
Wed
4/7/21 12
Auto
Schedul
ed
Submission of the Draft
Research paper 2 days Thu
4/8/21 Fri 4/9/21 13
Auto
Schedu
led
Submission of the Final Project
Paper
11.5
mons
Mon
4/12/21
Fri
2/25/22
Auto
Schedul
ed
Critical Analysis of the findings 150 days Mon
4/12/21
Fri
11/5/21 14
Auto
Schedul
ed
Concluding the Findings of the
Study 60 days Mon
11/8/21
Fri
1/28/22 16
Auto
Schedul
ed
Recommendations 20 days Mon
1/31/22
Fri
2/25/22 17

18RESEARCH PAPER
Auto
Schedul
ed
Submitting the Final Project
Report 0 days Fri
2/25/22
Fri
2/25/22 18
Gantt chart:
Conclusion:
Smart cities are considered to be complex system which are seen to be consisting of
heterogeneous devices which are associated with communicating amongst themselves by making
use of a plethora of communications. This devices along with the protocols are seen to be
vulnerable to various kind of security as well as privacy issues. This paper is entirely associated
with discussing about the smart city architecture along with the different kind of applications as
well, however the paper is mainly associated with highlighting the major security and privacy
issues of the IoT enabled Smart cities. The entire research is conducted for understanding this
issues so as to identify the major ways by which this issues can be eliminated or mitigated.
Auto
Schedul
ed
Submitting the Final Project
Report 0 days Fri
2/25/22
Fri
2/25/22 18
Gantt chart:
Conclusion:
Smart cities are considered to be complex system which are seen to be consisting of
heterogeneous devices which are associated with communicating amongst themselves by making
use of a plethora of communications. This devices along with the protocols are seen to be
vulnerable to various kind of security as well as privacy issues. This paper is entirely associated
with discussing about the smart city architecture along with the different kind of applications as
well, however the paper is mainly associated with highlighting the major security and privacy
issues of the IoT enabled Smart cities. The entire research is conducted for understanding this
issues so as to identify the major ways by which this issues can be eliminated or mitigated.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

19RESEARCH PAPER
References:
Alansari, Z., Soomro, S., Belgaum, M.R. and Shamshirband, S., 2018. The rise of Internet of
Things (IoT) in big healthcare data: review and open research issues. In Progress in Advanced
Computing and Intelligent Engineering (pp. 675-685). Springer, Singapore.
Amendola, S., Lodato, R., Manzari, S., Occhiuzzi, C. and Marrocco, G., 2014. RFID technology
for IoT-based personal healthcare in smart spaces. IEEE Internet of things journal, 1(2), pp.144-
152.
Brannen, J., 2017. Mixing methods: Qualitative and quantitative research. Routledge.
Bresler, L. and Stake, R.E., 2017. Qualitative research methodology in music education.
In Critical Essays in Music Education (pp. 113-128). Routledge.
Centenaro, M., Vangelista, L., Zanella, A. and Zorzi, M., 2016. Long-range communications in
unlicensed bands: The rising stars in the IoT and smart city scenarios. IEEE Wireless
Communications, 23(5), pp.60-67.
Chen, S., Xu, H., Liu, D., Hu, B. and Wang, H., 2014. A vision of IoT: Applications, challenges,
and opportunities with china perspective. IEEE Internet of Things journal, 1(4), pp.349-359.
Chiang, M. and Zhang, T., 2016. Fog and IoT: An overview of research opportunities. IEEE
Internet of Things Journal, 3(6), pp.854-864.
Farooq, M.U., Waseem, M., Khairi, A. and Mazhar, S., 2015. A critical analysis on the security
concerns of internet of things (IoT). International Journal of Computer Applications, 111(7).
Fletcher, A.J., 2017. Applying critical realism in qualitative research: methodology meets
method. International Journal of Social Research Methodology, 20(2), pp.181-194.
References:
Alansari, Z., Soomro, S., Belgaum, M.R. and Shamshirband, S., 2018. The rise of Internet of
Things (IoT) in big healthcare data: review and open research issues. In Progress in Advanced
Computing and Intelligent Engineering (pp. 675-685). Springer, Singapore.
Amendola, S., Lodato, R., Manzari, S., Occhiuzzi, C. and Marrocco, G., 2014. RFID technology
for IoT-based personal healthcare in smart spaces. IEEE Internet of things journal, 1(2), pp.144-
152.
Brannen, J., 2017. Mixing methods: Qualitative and quantitative research. Routledge.
Bresler, L. and Stake, R.E., 2017. Qualitative research methodology in music education.
In Critical Essays in Music Education (pp. 113-128). Routledge.
Centenaro, M., Vangelista, L., Zanella, A. and Zorzi, M., 2016. Long-range communications in
unlicensed bands: The rising stars in the IoT and smart city scenarios. IEEE Wireless
Communications, 23(5), pp.60-67.
Chen, S., Xu, H., Liu, D., Hu, B. and Wang, H., 2014. A vision of IoT: Applications, challenges,
and opportunities with china perspective. IEEE Internet of Things journal, 1(4), pp.349-359.
Chiang, M. and Zhang, T., 2016. Fog and IoT: An overview of research opportunities. IEEE
Internet of Things Journal, 3(6), pp.854-864.
Farooq, M.U., Waseem, M., Khairi, A. and Mazhar, S., 2015. A critical analysis on the security
concerns of internet of things (IoT). International Journal of Computer Applications, 111(7).
Fletcher, A.J., 2017. Applying critical realism in qualitative research: methodology meets
method. International Journal of Social Research Methodology, 20(2), pp.181-194.

20RESEARCH PAPER
Flick, U., 2015. Introducing research methodology: A beginner's guide to doing a research
project. Sage.
Gubbi, J., Buyya, R., Marusic, S. and Palaniswami, M., 2013. Internet of Things (IoT): A vision,
architectural elements, and future directions. Future generation computer systems, 29(7),
pp.1645-1660.
He, W., Yan, G. and Da Xu, L., 2014. Developing vehicular data cloud services in the IoT
environment. IEEE Transactions on Industrial Informatics, 10(2), pp.1587-1595.
Huh, S., Cho, S. and Kim, S., 2017, February. Managing IoT devices using blockchain platform.
In 2017 19th international conference on advanced communication technology (ICACT) (pp.
464-467). IEEE.
Kelly, S.D.T., Suryadevara, N.K. and Mukhopadhyay, S.C., 2013. Towards the implementation
of IoT for environmental condition monitoring in homes. IEEE sensors journal, 13(10), pp.3846-
3853.
Khan, M.A. and Salah, K., 2018. IoT security: Review, blockchain solutions, and open
challenges. Future Generation Computer Systems, 82, pp.395-411.
Kolias, C., Kambourakis, G., Stavrou, A. and Voas, J., 2017. DDoS in the IoT: Mirai and other
botnets. Computer, 50(7), pp.80-84.
Kumar, R., 2019. Research methodology: A step-by-step guide for beginners. Sage Publications
Limited.
Silverman, D. ed., 2016. Qualitative research. Sage.
Flick, U., 2015. Introducing research methodology: A beginner's guide to doing a research
project. Sage.
Gubbi, J., Buyya, R., Marusic, S. and Palaniswami, M., 2013. Internet of Things (IoT): A vision,
architectural elements, and future directions. Future generation computer systems, 29(7),
pp.1645-1660.
He, W., Yan, G. and Da Xu, L., 2014. Developing vehicular data cloud services in the IoT
environment. IEEE Transactions on Industrial Informatics, 10(2), pp.1587-1595.
Huh, S., Cho, S. and Kim, S., 2017, February. Managing IoT devices using blockchain platform.
In 2017 19th international conference on advanced communication technology (ICACT) (pp.
464-467). IEEE.
Kelly, S.D.T., Suryadevara, N.K. and Mukhopadhyay, S.C., 2013. Towards the implementation
of IoT for environmental condition monitoring in homes. IEEE sensors journal, 13(10), pp.3846-
3853.
Khan, M.A. and Salah, K., 2018. IoT security: Review, blockchain solutions, and open
challenges. Future Generation Computer Systems, 82, pp.395-411.
Kolias, C., Kambourakis, G., Stavrou, A. and Voas, J., 2017. DDoS in the IoT: Mirai and other
botnets. Computer, 50(7), pp.80-84.
Kumar, R., 2019. Research methodology: A step-by-step guide for beginners. Sage Publications
Limited.
Silverman, D. ed., 2016. Qualitative research. Sage.

21RESEARCH PAPER
Lazarescu, M.T., 2013. Design of a WSN platform for long-term environmental monitoring for
IoT applications. IEEE Journal on emerging and selected topics in circuits and systems, 3(1),
pp.45-54.
Lee, I. and Lee, K., 2015. The Internet of Things (IoT): Applications, investments, and
challenges for enterprises. Business Horizons, 58(4), pp.431-440.
Lee, S.E., Choi, M. and Kim, S., 2017. How and what to study about IoT: Research trends and
future directions from the perspective of social science. Telecommunications Policy, 41(10),
pp.1056-1067.
Madakam, S., Ramaswamy, R. and Tripathi, S., 2015. Internet of Things (IoT): A literature
review. Journal of Computer and Communications, 3(05), p.164.
McCusker, K. and Gunaydin, S., 2015. Research using qualitative, quantitative or mixed
methods and choice based on the research. Perfusion, 30(7), pp.537-542.
Tao, F., Zuo, Y., Da Xu, L. and Zhang, L., 2014. IoT-based intelligent perception and access of
manufacturing resource toward cloud manufacturing. IEEE Transactions on Industrial
Informatics, 10(2), pp.1547-1557.
Tukker, A., De Koning, A., Wood, R., Hawkins, T., Lutter, S., Acosta, J., Rueda Cantuche, J.M.,
Bouwmeester, M., Oosterhaven, J., Drosdowski, T. and Kuenen, J., 2013. EXIOPOL–
development and illustrative analyses of a detailed global MR EE SUT/IOT. Economic Systems
Research, 25(1), pp.50-70.
Lazarescu, M.T., 2013. Design of a WSN platform for long-term environmental monitoring for
IoT applications. IEEE Journal on emerging and selected topics in circuits and systems, 3(1),
pp.45-54.
Lee, I. and Lee, K., 2015. The Internet of Things (IoT): Applications, investments, and
challenges for enterprises. Business Horizons, 58(4), pp.431-440.
Lee, S.E., Choi, M. and Kim, S., 2017. How and what to study about IoT: Research trends and
future directions from the perspective of social science. Telecommunications Policy, 41(10),
pp.1056-1067.
Madakam, S., Ramaswamy, R. and Tripathi, S., 2015. Internet of Things (IoT): A literature
review. Journal of Computer and Communications, 3(05), p.164.
McCusker, K. and Gunaydin, S., 2015. Research using qualitative, quantitative or mixed
methods and choice based on the research. Perfusion, 30(7), pp.537-542.
Tao, F., Zuo, Y., Da Xu, L. and Zhang, L., 2014. IoT-based intelligent perception and access of
manufacturing resource toward cloud manufacturing. IEEE Transactions on Industrial
Informatics, 10(2), pp.1547-1557.
Tukker, A., De Koning, A., Wood, R., Hawkins, T., Lutter, S., Acosta, J., Rueda Cantuche, J.M.,
Bouwmeester, M., Oosterhaven, J., Drosdowski, T. and Kuenen, J., 2013. EXIOPOL–
development and illustrative analyses of a detailed global MR EE SUT/IOT. Economic Systems
Research, 25(1), pp.50-70.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

22RESEARCH PAPER
Verma, S., Kawamoto, Y., Fadlullah, Z.M., Nishiyama, H. and Kato, N., 2017. A survey on
network methodologies for real-time analytics of massive IoT data and open research
issues. IEEE Communications Surveys & Tutorials, 19(3), pp.1457-1477.
Walliman, N., 2017. Research methods: The basics. Routledge.
Wang, Y.P.E., Lin, X., Adhikary, A., Grövlen, A., Sui, Y., Blankenship, Y., Bergman, J. and
Razaghi, H.S., 2016. A primer on 3GPP narrowband Internet of Things (NB-IoT). arXiv preprint
arXiv:1606.04171.
Xu, T., Wendt, J.B. and Potkonjak, M., 2014, November. Security of IoT systems: Design
challenges and opportunities. In Proceedings of the 2014 IEEE/ACM International Conference
on Computer-Aided Design (pp. 417-423). IEEE Press.
Zhang, Z.K., Cho, M.C.Y., Wang, C.W., Hsu, C.W., Chen, C.K. and Shieh, S., 2014, November.
IoT security: ongoing challenges and research opportunities. In 2014 IEEE 7th international
conference on service-oriented computing and applications (pp. 230-234). IEEE.
Zhao, K. and Ge, L., 2013, December. A survey on the internet of things security. In 2013 Ninth
international conference on computational intelligence and security (pp. 663-667). IEEE.
Verma, S., Kawamoto, Y., Fadlullah, Z.M., Nishiyama, H. and Kato, N., 2017. A survey on
network methodologies for real-time analytics of massive IoT data and open research
issues. IEEE Communications Surveys & Tutorials, 19(3), pp.1457-1477.
Walliman, N., 2017. Research methods: The basics. Routledge.
Wang, Y.P.E., Lin, X., Adhikary, A., Grövlen, A., Sui, Y., Blankenship, Y., Bergman, J. and
Razaghi, H.S., 2016. A primer on 3GPP narrowband Internet of Things (NB-IoT). arXiv preprint
arXiv:1606.04171.
Xu, T., Wendt, J.B. and Potkonjak, M., 2014, November. Security of IoT systems: Design
challenges and opportunities. In Proceedings of the 2014 IEEE/ACM International Conference
on Computer-Aided Design (pp. 417-423). IEEE Press.
Zhang, Z.K., Cho, M.C.Y., Wang, C.W., Hsu, C.W., Chen, C.K. and Shieh, S., 2014, November.
IoT security: ongoing challenges and research opportunities. In 2014 IEEE 7th international
conference on service-oriented computing and applications (pp. 230-234). IEEE.
Zhao, K. and Ge, L., 2013, December. A survey on the internet of things security. In 2013 Ninth
international conference on computational intelligence and security (pp. 663-667). IEEE.
1 out of 23
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.