A Survey on Data Privacy and Security in Internet of Things
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 6
Abstract
The Internet of Things (IoT) is the use of intelligently connected devices and systems to use and manage data collected by embedded sensors and actuators in devices. The internet of things allows devices to be controlled remotely across existing network. According to the Gartner, by year 2020, 260 million objects will be connected and monitored. As the Internet of Things evolves, the proliferation of good connected devices supported by mobile networks, providing pervasive and seamless connection, can unlock opportunities to provide life-enhancing services for customers as well as boosting productivity for enterprises. For consumers, property provided by the IoT may enhance their quality of life in multiple ways. Within the home, the combination of connected sensible devices and cloud-based services can facilitate address the difficulty of energy efficiency and security. IoT security is the area dealing with protecting connected devices and networks in the Internet of things. A recent study regarding the foremost widespread devices in some of the foremost common IoT niches reveals alarmingly high average variety of vulnerabilities per device. On average, twenty five vulnerabilities were found per device. Multiple attacks have already been reported within the past against totally different embedded devices and that we will expect several a lot of within the IoT domain. This paper, is a survey on internet of things, security vulnerabilities and solutions.
Authors and Affiliations
Sheeba P
Review on Capturing User Intention from Content Base Image Retrieval
the search engine returns thousands of images ranked by the keywords extracted from the surrounding text. It is well known that text-based image search suffers from the ambiguity of query keywords. The keywords provided...
Automated Security System
In this project, a home security system has been designed, developed, tested and validated. Security is basically a door security system which consists of different mode of input elements while the output elements react...
A Review on Speech Segmentation Technique
As information technology has an impact on more and more aspects of our daily lives, the problem of communication between human beings and information-processing devices become increasingly important. Up to now such com...
Substation Automation System for Energy Monitoring and Control using SCADA
Inherent scarcity of thermal sources with a time varying temperature profile is the reason why the Thermo electricbased energy harvesting is not as prominent as its counter-part, thermoelectric generators, in the thermal...
Watermarking: Some Best Practices
To protects intellectual property rights, the amount of exchanged digital content calls are rapidly growing based on efficient and practical techniques. During the past two decades, watermarking techniques have been pre...