Current Issues and Challenges of Security in IoT Based Applications

作者: Mritunjay Kumar Rai , Rajeev Kanday , Reji Thomas

DOI: 10.1007/978-3-030-34387-3_71

关键词:

摘要: The abstract should summarize the contents of paper in short terms, i.e. 150–250 words. Automation sensor-based network has made Internet Things (IoTs) a reality. From wearable gadgets, smart homes, city, industrial internet, connected car, health, retail down to farming, IoT plays major role at present. This drastic development now met with security issues such as privacy, infrastructure, leakage information, loss services etc and is challenges. In this communication, we have surveyed literature understand various immediate challenges be addressed overcome issues. Different factors like mobility, scalability, resource limitation etc. are considered for analyzing current researchers can identify some open research problems meet promote further.

参考文章(64)
Young-Hyun Kim, Myong-Soo Kim, Myung-Hye Park, Soo-Kyung Kang, Chang-Soo Eun, Study on the Low Energy Consumption Method for Light-Wight Devices in IoT Service Environment International Journal of Grid and Distributed Computing. ,vol. 11, pp. 99- 108 ,(2018) , 10.14257/IJGDC.2018.11.8.09
Ji-Hoon Seo, Jin-Tak Choi, Customized Mobile Marketing Platform Design Utilizing IoT based Beacon Sensor Devices International Journal of Grid and Distributed Computing. ,vol. 11, pp. 57- 68 ,(2018) , 10.14257/IJGDC.2018.11.8.06
Trusit Shah, S Venkatesan, Authentication of IoT Device and IoT Server Using Secure Vaults trust security and privacy in computing and communications. pp. 819- 824 ,(2018) , 10.1109/TRUSTCOM/BIGDATASE.2018.00117
Stephanie Chollet, Laurent Pion, Nicolas Barbot, Clement Michel, Secure IoT for a Pervasive Platform 2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops). pp. 113- 118 ,(2018) , 10.1109/PERCOMW.2018.8480250
Ramanpreet Kaur Deol, , Intruder Detection System Using Face Recognition for Home Security IoT Applications: A Python Raspberry Pi 3 Case Study International Journal of Security Technology for Smart Device. ,vol. 5, pp. 21- 32 ,(2018) , 10.21742/IJSTSD.2018.5.2.04
Murtaza Hussain Shaikh, , Indication of European Union Clients’ Privacy Conservation in an IoT SCM System ieee international conference on cloud computing technology and science. ,vol. 5, pp. 7- 12 ,(2018) , 10.21742/IJPCCEM.2018.5.2.02
Sun-Ju Kim, Ji-Hyun Min, Han-Na Kim, The Development of an IoT-Based Educational Simulator for Dental Radiography IEEE Access. ,vol. 7, pp. 12476- 12483 ,(2019) , 10.1109/ACCESS.2019.2891569
Minje Cho, Hyung Rim Choi, ChoulHoon Kwak, A Study on the Navigation Aids Management Based on IoT International Journal of Control and Automation. ,vol. 8, pp. 193- 204 ,(2015) , 10.14257/IJCA.2015.8.7.21
Jung ho Eom, Security Threats Recognition and Countermeasures on Smart Battlefield Environment based on IoT International Journal of Security and Its Applications. ,vol. 9, pp. 347- 356 ,(2015) , 10.14257/IJSIA.2015.9.7.32
Abhijit Patil, Gaurav Bansod, Narayan Pisharoty, None, Hybrid Lightweight and Robust Encryption Design for Security in IoT International journal of security and its applications. ,vol. 9, pp. 85- 98 ,(2015) , 10.14257/IJSIA.2015.9.12.10