Analysis of Security Mechanisms Based on Clusters IoT Environments
Journal Title: International Journal of Interactive Multimedia and Artificial Intelligence - Year 2017, Vol 4, Issue 3
Abstract
Internet of things is based on sensors, communication networks and intelligence that manages the entire process and the generated data. Sensors are the senses of systems, because of this, they can be used in large quantities. Sensors must have low power consumption and cost, small size and great flexibility for its use in all circumstances. Therefore, the security of these network devices, data sensors and other devices, is a major concern as it grows rapidly in terms of nodes interconnected via sensor data. This paper presents an analysis from a systematic review point of view of articles on Internet of Things (IoT), security aspects specifically at privacy level and control access in this type of environment. Finally, it presents an analysis of security issues that must be addressed, from different clusters and identified areas within the fields of application of this technology.
Authors and Affiliations
Paulo Gaona-García, Carlos Montenegro-Marin, Juan David Prieto, Yuri Vanessa Nieto
A System to Generate SignWriting for Video Tracks Enhancing Accessibility of Deaf People
Video content has increased much on the Internet during last years. In spite of the efforts of different organizations and governments to increase the accessibility of websites, most multimedia content on the Internet is...
A review about Smart Objects, Sensors, and Actuators
Smart Objects and the Internet of Things are two ideas which describe the future, walk together, and complement each other. Thus, the interconnection among objects can make them more intelligent or expand their intellige...
Modified Three-Step Search Block Matching Motion Estimation and Weighted Finite Automata based Fractal Video Compression
The major challenge with fractal image/video coding technique is that, it requires more encoding time. Therefore, how to reduce the encoding time is the research component remains in the fractal coding. Block matching mo...
An Effective Hybrid Butterfly Optimization Algorithm with Artificial Bee Colony for Numerical Optimization
In this paper, a new hybrid optimization algorithm which combines the standard Butterfly Optimization Algorithm (BOA) with Artificial Bee Colony (ABC) algorithm is proposed. The proposed algorithm used the advantages of...
Handwritten Character Recognition Based on the Specificity and the Singularity of the Arabic Language
A good Arabic handwritten recognition system must consider the characteristics of Arabic letters which can be explicit such as the presence of diacritics or implicit such as the baseline information (a virtual line on wh...