Features and Potential Security Challenges for IoT Enabled Devices in Smart City Environment
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 8
Abstract
Introduction of Internet of Things in our lives have brought drastic changes in the social norms, working habits, ways of completing tasks and planning for future. Data about our interactions with everyday objects can be effectively transmitted to their destinations with many communicating tags that also often provide specific location information. The risk of potential eavesdropping is always a major concern of data owners. Since Internet of Things is primarily responsible for carrying data of smart objects which are mostly connected over wireless technologies, securing of information carried by these wireless links to safeguard the private information is of utmost importance. Cryptographic techniques to cypher data carried by the IoT networks is one possibility which is not feasible due to the lack of sufficient computing resources at the sensor end of IoT devices. In this paper, we discuss various security issues that haunt the secure IoT deployments and propose a layered solution model that prevents breach of security during transmission of data.
Authors and Affiliations
Gasim Alandjani
Methods of Isolation for Application Traces Using Virtual Machines and Shadow Copies
To improve the user's experience, almost all applications save usage data: web browsers save history and cookies, chat programs save message archives and so on. However, this data can be confidential and may compromise t...
Design and Simulation of Adaptive Controller for Single Phase Grid Connected Photovoltaic Inverter under Distorted Grid Conditions
This paper presents an adaptive controller for single-phase grid-connected photovoltaic inverter under abnormal grid conditions. The main problem associated with the controllers of the grid-connected inverter is that the...
Industrial Financial Forecasting using Long Short-Term Memory Recurrent Neural Networks
This research deals with the industrial financial forecasting in order to calculate the yearly expenditure of the organization. Forecasting helps in estimation of the future trends and provides a valuable information to...
An Open Source P2P Encrypted Voip Application
Open source is the future of technology. This community is growing by the day; developing and improving existing frameworks and software for free. Open source replacements are coming up for almost all proprietary softwar...
Empirical Evaluation of Modified Agile Models
Empirical evaluation is one of the widely accepted validation method in the domain of software engineering which investigates the proposed technique via practical experience and reflects its benefits and limitations. Due...