SlideShare a Scribd company logo
1 of 3
Download to read offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume: 3 | Issue: 4 | May-Jun 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 - 6470
@ IJTSRD | Unique Paper ID - IJTSRD24010 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1041
Internet of Things (IoT): Security Perspective
Sunilkumar Malge, Pallavi Singh
ASM Institute of Management & Computer Studies (IMCOST), Thane, Maharashtra, India
How to cite this paper: Sunilkumar
Malge | Pallavi Singh "Internet of Things
(IoT): Security Perspective" Published
in International Journal of Trend in
Scientific Research and Development
(ijtsrd), ISSN: 2456-
6470, Volume-3 |
Issue-4, June 2019,
pp.1041-1043, URL:
https://www.ijtsrd.c
om/papers/ijtsrd24
010.pdf
Copyright © 2019 by author(s) and
International Journal of Trend in
Scientific Research and Development
Journal. This is an Open Access article
distributed under
the terms of the
Creative Commons
Attribution License (CC BY 4.0)
(http://creativecommons.org/licenses/
by/4.0)
ABSTRACT
In the past decade, internet of things (IoT) has been a focus of research. Itmakes
more intelligent to core element of modern world such as hospitals, cities,
organizations, and buildings. Usually, IoT has four major components including
sensing, information processing, applicationsand services,heterogeneous access
and additional components e.g. Security and privacy. In this paper, we are
presenting security perspective from the perspective of layers that comprises
IoT. In this we focus on the overview of IoT security perspective.
Keywords: Internet of Things, Security, Privacy, Confidentiality, Cryptography
Algorithms, Security Attacks
I. INTRODUCTION
Internet of Things (IoT) enables various devices to interact with each other via
Internet. This ensures the devices to be smart and send the information to a
centralized system, which willthenmonitor andtakeactionsaccordingtothetask
given to it.IoT can be used in many domains such healthcare, transportation,
entertainment, power grids and smart buildings. IoT is expected to act as a
catalyst for the future technological innovations and its use is expected to rise
exponentially over the coming years.
According to security perspective, the IoT will be faced with more severe
challenges. E.g. (1) The IoT extends the ‘internet’ through thetraditionalinternet,
sensor network and mobile network and so on, (2) every ‘thing’willbe connected
to this ‘internet’, and (3) these ‘things’ will communicate
with each other. Therefore, the new security and privacy
problems will arise.Here; we pay more attention to the
research issues for confidentiality,integrity, andauthenticity
of data in the IOT.
II. Core Layers of IoT
In general, the IoT can be divided into four key levels.
1. Perception Layer:
The most basic level is the perceptual layer (also known as
recognition layer), which collects all kinds of information
through physical equipment and identifies the physical
world, the information includes object properties,
environmental condition etc.; and physical equipment
include RFID reader, all kinds of sensors, GPS and other
equipments.The key component in this layer is sensors for
capturing and representing the physical world in the digital
world.
2. Network Layer:
The second level layer is Network layer. Network layer is
responsible for thereliabletransmissionofinformation from
perceptual layer, initial processing of information,
classification and polymerization. In this layer the
information transmission is relied on severalbasicnetworks,
which are the internet, mobile communication network,
wireless network, satellite nets, network infrastructure and
communication protocols are also essential to the
information exchange between devices.
3. Physical Layer:
The third level layer is physical layer. Physical layer will set
up a reliable support platform for the application layer, on
this support platform all kind of intelligent computing
powers will be organized through network grid and cloud
computing. It plays the role of combining application layer
upward and network layer downward.
4. Application Layer:
The application layer is the topmost and terminal level.
Application layer provides the personalized services
according to the needs of the users. Users can access to the
internet of thing through the application layer interface
using of personal computer, mobile equipment and
television so on.
IJTSRD24010
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID - IJTSRD24010 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1042
III. Security in IoT:
A. Security Features
1. Perceptual Layer:
Usually perceptual nodes are less of storage capacity and
computer power as they are simple as well as with less
power. So, it is not able to apply frequency hopping
communication and public key encryption algorithm to
security protection. As it is very difficult to set up security
protection system. Meanwhile attacks from the external
network such as deny of service also will bring new security
problems. Apart from this sensor data still need the
protection for confidentiality, integrity, authenticity.
2. Network Layer:
Although the core network hascomplete abilityofprotection
security, but Man-in-the-Middle Attack and counterfeit
attack still exist, Along this , congestion can be caused huge
number of data sending. Therefore security mechanism in
this level is very important to the IoT.
3. Support Layer:
Do the mass data processing and intelligent decision of
network behavior in this layer, intelligent processing is
limited for malicious information, so it is a challenge to
improve the ability to recognize the malicious information.
4. Application Layer:
In this level different security applied for different
application environment. The major characteristic of
Application layer is data sharing which harms data privacy,
access control and disclosure of information.
B. Security Requirements:
1. Perceptual Layer:
At first node authentication is necessary to prevent illegal
node access; secondly to protect the confidentiality of
information transmission between the nodes, data
encryption is absolute necessity; and before the data
encryption key agreement is an important process in
advance; the stronger are the safety measures, the more is
consumption of resources, to solve thisproblem, lightweight
encryption technology becomes important, which includes
Lightweight cryptographic algorithm and lightweight
cryptographic protocol. At the same time the integrity and
authenticity of sensor data is becoming research focus, we
will discuss this question more in-depth in the next section.
2. Network Layer:
In this layer existing communication security mechanisms
are difficult to be applied. Identity authentication isakind of
mechanism to prevent the illegal nodes, and itisthepremise
of the security mechanism,confidentialityand integralityare
of equal importance, thus we also need to establish data
confidentiality and integrality mechanism. Besides
distributed denial of service attack (DDoS) is a common
attack method in the network and is particularly severe in
the internet of thing, so to prevent the DDOS attack for the
vulnerable node is another problem to be solved in this
layer.
3. Support Layer:
Support layer needs a lot of the application security
architecture such as cloud computing and secure multiparty
computation, almost all of the strong encryption algorithm
and encryption protocol, stronger system security
technology and anti-virus.
4. Application Layer:
To solve the security problem of application layer, we need
two aspects. One is the authentication and key agreement
across the heterogeneous network, the other is user’s
privacy protection. In addition, education and management
are very important to information security, especially
password management. In summary security technology in
the IoT is very important and full of challenges. In other
hands laws and regulations issues are also significant, we
will discuss this problem in the following.
IV. Technology used for security purpose in IoT
A. Encryption Mechanism:
In the IoT network layer and application layer connect so
closely, so we should choosebetween by-hopand end-to-end
encryption. If we adopt by-hop encryption, we can only
encrypt the links which need be protected, because in the
network layer we can apply it to all business, which make
different applications safely implemented. In this way,
security mechanism is transparent to the business
applications, which gives the end users convenience. In the
meantime this brings the features of the by-hop full play,
such as low latency, high efficiency, low cost, and so on.
However, because of the decryption operation in the
transmission node, using by-hop encryption each node can
get the plaintext message, so by-hop encryption needs high
credibility of the transmission nodes.
B. Communication Security:
At first in communication protocols there are some
solutions being established, these solutions can provide
integrity, authenticity, and confidentiality for
communication, for example: TLS/SSL or IPSec. TLS/SSL is
designed to encrypt the link in the transport layer, and IPSec
is designed to protect security of the network layer, theycan
provide integrity, authenticity, and confidentiality in the
each layer. And the needs of privacy also have been come up
with but unfortunately are not in wide use. Then
communication security mechanisms are also seldom
applied nowadays. Because in the IoT small devices are less
processing power, this leads that communication security is
often weak. Meanwhile in the IoT,thecorenetwork isalways
the current or next-generation Internet, most of the
information will be transmitted through the Internet.
C. Protecting sensor Data:
the integrity and authenticity of sensor data is becoming
research focus, and confidentiality of sensor data is a lower
demand because when an attacker can just place its own
sensor physically near, he can sense the same values. So at
the sensor itself the confidentiality need is relatively low.
The other main research target in sensors is privacy, and
privacy is also a major problem. We should adopt the
mechanisms to protect the privacy of humans and objects in
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID - IJTSRD24010 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1043
the physical world. Most times people are often unaware of
sensors in their life, so we need to set up regulations to
preserve the privacy of people. In the literature, several
guidelines are given to solve this problem in the design
phase: at first users must know that they are being sensed,
the second users must be able to choose whether they are
being sensed or not, the third users must be able to remain
anonymous. When the user has no realization of these
guidelines, that regulations must be made.
D. Cryptographic Algorithms:
So far there is a well-known and widely trusted suite of
cryptographic algorithms applied to internet security
protocols such as table. Usually the symmetric encryption
algorithm is used to encrypt data for confidentiality such as
the advanced encryption standard (AES) block cipher; the
asymmetric algorithm is often used to digital signaturesand
key transport, frequently-used algorithmistherivestshamir
adelman (RSA); the diffie-hellman (DH) asymmetric key
agreement algorithm is used to key agreement;and the SHA-
1 and SHA-256 secure hash algorithms will be applied for
integrality. Another significant asymmetric algorithm is
known as elliptic curve cryptography(ECC),ECC can provide
equal safety by use of shorter length key,theadoption of ECC
has been slowed and maybe be encouraged recently. To
implement these cryptographic algorithms available
resources are necessary such as processor speed and
memory. So how to apply these cryptographic techniques to
the IoT is not clear, we have to make more effort to further
research to ensure that algorithms can be successfully
implemented using of constrained memory and low-speed
processor in the IoT.
V. Conclusion
In the last few years, this emerging domain for the IoT has
been attracting the significant interest, and will continue for
the years to come. In spite of rapid evolution, we are still
facing new difficulties and severe challenges. In this
literature, we concisely reviewed security in the IoT, and
analyzed security characteristics and requirements from
four layers including perceptual layer, network layer,
support layer and application layer. Then, we discussed the
research status in this field from encryption mechanism,
communication security, protecting sensor data, and
encryption algorithm. At last we summarize several
challenges. All in all the development of the IoT will bring
more serious security problems, which are always the focus
and the primary task of the research.
VI. References
[1] https://www.researchgate.net/publication/30128171
4_Security_in_Internet_of_Things_Challenges_Solutions
_and_Future_Directions
[2] https://www.researchgate.net/publication/25402934
2_Security_in_the_Internet_of_Things_A_Review
[3] https://www.researchgate.net/publication/32826195
4_Study_on_Security_issues_in_Internet_of_Things

More Related Content

What's hot

DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol IJECEIAES
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT DevicesIRJET Journal
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewIJERA Editor
 
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET -  	  Cyber Security Threats and Vulnerabilities in IoTIRJET -  	  Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoTIRJET Journal
 
Attacks and Risks in Wireless Network Security
Attacks and Risks in Wireless Network SecurityAttacks and Risks in Wireless Network Security
Attacks and Risks in Wireless Network Securityijtsrd
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewjournalBEEI
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...IRJET Journal
 
Comprehensive survey of possible
Comprehensive survey of possibleComprehensive survey of possible
Comprehensive survey of possibleIJNSA Journal
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
 
IoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex TrainingIoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex TrainingBryan Len
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoTSKS
 
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET Journal
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsShyam Goyal
 
Security of rabin p key encapsulation mechanism
Security of rabin p key encapsulation mechanismSecurity of rabin p key encapsulation mechanism
Security of rabin p key encapsulation mechanismConference Papers
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security ElementsEurotech
 
Security Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh NetworkSecurity Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh Networkijtsrd
 

What's hot (20)

DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A Review
 
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET -  	  Cyber Security Threats and Vulnerabilities in IoTIRJET -  	  Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoT
 
Attacks and Risks in Wireless Network Security
Attacks and Risks in Wireless Network SecurityAttacks and Risks in Wireless Network Security
Attacks and Risks in Wireless Network Security
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
Comprehensive survey of possible
Comprehensive survey of possibleComprehensive survey of possible
Comprehensive survey of possible
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current status
 
7215nsa05
7215nsa057215nsa05
7215nsa05
 
Network security
Network securityNetwork security
Network security
 
IoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex TrainingIoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex Training
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of Things
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutions
 
Security of rabin p key encapsulation mechanism
Security of rabin p key encapsulation mechanismSecurity of rabin p key encapsulation mechanism
Security of rabin p key encapsulation mechanism
 
[IJCT V3I2P33] Authors: Karandeep Kaur
[IJCT V3I2P33] Authors: Karandeep Kaur[IJCT V3I2P33] Authors: Karandeep Kaur
[IJCT V3I2P33] Authors: Karandeep Kaur
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
 
Security Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh NetworkSecurity Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh Network
 

Similar to Internet of Things IoT Security Perspective

Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of ThingsBHAVANA KONERU
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docxballolliemin
 
Comprehensive Survey on Security Problems and Key Technologies of the Interne...
Comprehensive Survey on Security Problems and Key Technologies of the Interne...Comprehensive Survey on Security Problems and Key Technologies of the Interne...
Comprehensive Survey on Security Problems and Key Technologies of the Interne...RSIS International
 
Comprehensive survey on security problems and key technologies of the interne...
Comprehensive survey on security problems and key technologies of the interne...Comprehensive survey on security problems and key technologies of the interne...
Comprehensive survey on security problems and key technologies of the interne...RSIS International
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentDr. Amarjeet Singh
 
Analysis of Honeypot Networks and Intrusion Prevention System IPS on Wireless...
Analysis of Honeypot Networks and Intrusion Prevention System IPS on Wireless...Analysis of Honeypot Networks and Intrusion Prevention System IPS on Wireless...
Analysis of Honeypot Networks and Intrusion Prevention System IPS on Wireless...ijtsrd
 
Internet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityInternet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityYogeshIJTSRD
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts#essaywriting
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
 
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...IAEME Publication
 
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...cyberprosocial
 
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...IJCSIS Research Publications
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-ReviewAki Koivu
 
Survey of Security and Privacy Issues of Internet of Things
Survey of Security and Privacy Issues of Internet of ThingsSurvey of Security and Privacy Issues of Internet of Things
Survey of Security and Privacy Issues of Internet of ThingsEswar Publications
 
Privacy-aware secured discrete framework in wireless sensor network
Privacy-aware secured discrete framework in wireless sensor networkPrivacy-aware secured discrete framework in wireless sensor network
Privacy-aware secured discrete framework in wireless sensor networkIJECEIAES
 
Security Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT InfrastructureSecurity Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT InfrastructureIJAEMSJORNAL
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...DESMOND YUEN
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT SecurityCAS
 

Similar to Internet of Things IoT Security Perspective (20)

Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docx
 
Comprehensive Survey on Security Problems and Key Technologies of the Interne...
Comprehensive Survey on Security Problems and Key Technologies of the Interne...Comprehensive Survey on Security Problems and Key Technologies of the Interne...
Comprehensive Survey on Security Problems and Key Technologies of the Interne...
 
Comprehensive survey on security problems and key technologies of the interne...
Comprehensive survey on security problems and key technologies of the interne...Comprehensive survey on security problems and key technologies of the interne...
Comprehensive survey on security problems and key technologies of the interne...
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT Environment
 
Analysis of Honeypot Networks and Intrusion Prevention System IPS on Wireless...
Analysis of Honeypot Networks and Intrusion Prevention System IPS on Wireless...Analysis of Honeypot Networks and Intrusion Prevention System IPS on Wireless...
Analysis of Honeypot Networks and Intrusion Prevention System IPS on Wireless...
 
Internet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityInternet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything Connectivity
 
sample assignment
sample assignmentsample assignment
sample assignment
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
 
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
 
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
 
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-Review
 
Survey of Security and Privacy Issues of Internet of Things
Survey of Security and Privacy Issues of Internet of ThingsSurvey of Security and Privacy Issues of Internet of Things
Survey of Security and Privacy Issues of Internet of Things
 
Privacy-aware secured discrete framework in wireless sensor network
Privacy-aware secured discrete framework in wireless sensor networkPrivacy-aware secured discrete framework in wireless sensor network
Privacy-aware secured discrete framework in wireless sensor network
 
Security Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT InfrastructureSecurity Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT Infrastructure
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 

Internet of Things IoT Security Perspective

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume: 3 | Issue: 4 | May-Jun 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 - 6470 @ IJTSRD | Unique Paper ID - IJTSRD24010 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1041 Internet of Things (IoT): Security Perspective Sunilkumar Malge, Pallavi Singh ASM Institute of Management & Computer Studies (IMCOST), Thane, Maharashtra, India How to cite this paper: Sunilkumar Malge | Pallavi Singh "Internet of Things (IoT): Security Perspective" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-3 | Issue-4, June 2019, pp.1041-1043, URL: https://www.ijtsrd.c om/papers/ijtsrd24 010.pdf Copyright © 2019 by author(s) and International Journal of Trend in Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/ by/4.0) ABSTRACT In the past decade, internet of things (IoT) has been a focus of research. Itmakes more intelligent to core element of modern world such as hospitals, cities, organizations, and buildings. Usually, IoT has four major components including sensing, information processing, applicationsand services,heterogeneous access and additional components e.g. Security and privacy. In this paper, we are presenting security perspective from the perspective of layers that comprises IoT. In this we focus on the overview of IoT security perspective. Keywords: Internet of Things, Security, Privacy, Confidentiality, Cryptography Algorithms, Security Attacks I. INTRODUCTION Internet of Things (IoT) enables various devices to interact with each other via Internet. This ensures the devices to be smart and send the information to a centralized system, which willthenmonitor andtakeactionsaccordingtothetask given to it.IoT can be used in many domains such healthcare, transportation, entertainment, power grids and smart buildings. IoT is expected to act as a catalyst for the future technological innovations and its use is expected to rise exponentially over the coming years. According to security perspective, the IoT will be faced with more severe challenges. E.g. (1) The IoT extends the ‘internet’ through thetraditionalinternet, sensor network and mobile network and so on, (2) every ‘thing’willbe connected to this ‘internet’, and (3) these ‘things’ will communicate with each other. Therefore, the new security and privacy problems will arise.Here; we pay more attention to the research issues for confidentiality,integrity, andauthenticity of data in the IOT. II. Core Layers of IoT In general, the IoT can be divided into four key levels. 1. Perception Layer: The most basic level is the perceptual layer (also known as recognition layer), which collects all kinds of information through physical equipment and identifies the physical world, the information includes object properties, environmental condition etc.; and physical equipment include RFID reader, all kinds of sensors, GPS and other equipments.The key component in this layer is sensors for capturing and representing the physical world in the digital world. 2. Network Layer: The second level layer is Network layer. Network layer is responsible for thereliabletransmissionofinformation from perceptual layer, initial processing of information, classification and polymerization. In this layer the information transmission is relied on severalbasicnetworks, which are the internet, mobile communication network, wireless network, satellite nets, network infrastructure and communication protocols are also essential to the information exchange between devices. 3. Physical Layer: The third level layer is physical layer. Physical layer will set up a reliable support platform for the application layer, on this support platform all kind of intelligent computing powers will be organized through network grid and cloud computing. It plays the role of combining application layer upward and network layer downward. 4. Application Layer: The application layer is the topmost and terminal level. Application layer provides the personalized services according to the needs of the users. Users can access to the internet of thing through the application layer interface using of personal computer, mobile equipment and television so on. IJTSRD24010
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID - IJTSRD24010 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1042 III. Security in IoT: A. Security Features 1. Perceptual Layer: Usually perceptual nodes are less of storage capacity and computer power as they are simple as well as with less power. So, it is not able to apply frequency hopping communication and public key encryption algorithm to security protection. As it is very difficult to set up security protection system. Meanwhile attacks from the external network such as deny of service also will bring new security problems. Apart from this sensor data still need the protection for confidentiality, integrity, authenticity. 2. Network Layer: Although the core network hascomplete abilityofprotection security, but Man-in-the-Middle Attack and counterfeit attack still exist, Along this , congestion can be caused huge number of data sending. Therefore security mechanism in this level is very important to the IoT. 3. Support Layer: Do the mass data processing and intelligent decision of network behavior in this layer, intelligent processing is limited for malicious information, so it is a challenge to improve the ability to recognize the malicious information. 4. Application Layer: In this level different security applied for different application environment. The major characteristic of Application layer is data sharing which harms data privacy, access control and disclosure of information. B. Security Requirements: 1. Perceptual Layer: At first node authentication is necessary to prevent illegal node access; secondly to protect the confidentiality of information transmission between the nodes, data encryption is absolute necessity; and before the data encryption key agreement is an important process in advance; the stronger are the safety measures, the more is consumption of resources, to solve thisproblem, lightweight encryption technology becomes important, which includes Lightweight cryptographic algorithm and lightweight cryptographic protocol. At the same time the integrity and authenticity of sensor data is becoming research focus, we will discuss this question more in-depth in the next section. 2. Network Layer: In this layer existing communication security mechanisms are difficult to be applied. Identity authentication isakind of mechanism to prevent the illegal nodes, and itisthepremise of the security mechanism,confidentialityand integralityare of equal importance, thus we also need to establish data confidentiality and integrality mechanism. Besides distributed denial of service attack (DDoS) is a common attack method in the network and is particularly severe in the internet of thing, so to prevent the DDOS attack for the vulnerable node is another problem to be solved in this layer. 3. Support Layer: Support layer needs a lot of the application security architecture such as cloud computing and secure multiparty computation, almost all of the strong encryption algorithm and encryption protocol, stronger system security technology and anti-virus. 4. Application Layer: To solve the security problem of application layer, we need two aspects. One is the authentication and key agreement across the heterogeneous network, the other is user’s privacy protection. In addition, education and management are very important to information security, especially password management. In summary security technology in the IoT is very important and full of challenges. In other hands laws and regulations issues are also significant, we will discuss this problem in the following. IV. Technology used for security purpose in IoT A. Encryption Mechanism: In the IoT network layer and application layer connect so closely, so we should choosebetween by-hopand end-to-end encryption. If we adopt by-hop encryption, we can only encrypt the links which need be protected, because in the network layer we can apply it to all business, which make different applications safely implemented. In this way, security mechanism is transparent to the business applications, which gives the end users convenience. In the meantime this brings the features of the by-hop full play, such as low latency, high efficiency, low cost, and so on. However, because of the decryption operation in the transmission node, using by-hop encryption each node can get the plaintext message, so by-hop encryption needs high credibility of the transmission nodes. B. Communication Security: At first in communication protocols there are some solutions being established, these solutions can provide integrity, authenticity, and confidentiality for communication, for example: TLS/SSL or IPSec. TLS/SSL is designed to encrypt the link in the transport layer, and IPSec is designed to protect security of the network layer, theycan provide integrity, authenticity, and confidentiality in the each layer. And the needs of privacy also have been come up with but unfortunately are not in wide use. Then communication security mechanisms are also seldom applied nowadays. Because in the IoT small devices are less processing power, this leads that communication security is often weak. Meanwhile in the IoT,thecorenetwork isalways the current or next-generation Internet, most of the information will be transmitted through the Internet. C. Protecting sensor Data: the integrity and authenticity of sensor data is becoming research focus, and confidentiality of sensor data is a lower demand because when an attacker can just place its own sensor physically near, he can sense the same values. So at the sensor itself the confidentiality need is relatively low. The other main research target in sensors is privacy, and privacy is also a major problem. We should adopt the mechanisms to protect the privacy of humans and objects in
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID - IJTSRD24010 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1043 the physical world. Most times people are often unaware of sensors in their life, so we need to set up regulations to preserve the privacy of people. In the literature, several guidelines are given to solve this problem in the design phase: at first users must know that they are being sensed, the second users must be able to choose whether they are being sensed or not, the third users must be able to remain anonymous. When the user has no realization of these guidelines, that regulations must be made. D. Cryptographic Algorithms: So far there is a well-known and widely trusted suite of cryptographic algorithms applied to internet security protocols such as table. Usually the symmetric encryption algorithm is used to encrypt data for confidentiality such as the advanced encryption standard (AES) block cipher; the asymmetric algorithm is often used to digital signaturesand key transport, frequently-used algorithmistherivestshamir adelman (RSA); the diffie-hellman (DH) asymmetric key agreement algorithm is used to key agreement;and the SHA- 1 and SHA-256 secure hash algorithms will be applied for integrality. Another significant asymmetric algorithm is known as elliptic curve cryptography(ECC),ECC can provide equal safety by use of shorter length key,theadoption of ECC has been slowed and maybe be encouraged recently. To implement these cryptographic algorithms available resources are necessary such as processor speed and memory. So how to apply these cryptographic techniques to the IoT is not clear, we have to make more effort to further research to ensure that algorithms can be successfully implemented using of constrained memory and low-speed processor in the IoT. V. Conclusion In the last few years, this emerging domain for the IoT has been attracting the significant interest, and will continue for the years to come. In spite of rapid evolution, we are still facing new difficulties and severe challenges. In this literature, we concisely reviewed security in the IoT, and analyzed security characteristics and requirements from four layers including perceptual layer, network layer, support layer and application layer. Then, we discussed the research status in this field from encryption mechanism, communication security, protecting sensor data, and encryption algorithm. At last we summarize several challenges. All in all the development of the IoT will bring more serious security problems, which are always the focus and the primary task of the research. VI. References [1] https://www.researchgate.net/publication/30128171 4_Security_in_Internet_of_Things_Challenges_Solutions _and_Future_Directions [2] https://www.researchgate.net/publication/25402934 2_Security_in_the_Internet_of_Things_A_Review [3] https://www.researchgate.net/publication/32826195 4_Study_on_Security_issues_in_Internet_of_Things