INTERNET OF THINGS: A REVIEW ON ARCHITECTURE, SECURITY THREATS AND COUNTERMEASURES
Journal Title: International Journal of Computer Networking, Wireless and Mobile Communications (IJCNWMC) - Year 2018, Vol 8, Issue 3
Abstract
Internet of Things also referred to as a distributed network of heterogeneous devices, provides the ability for humans to learn and interact with internet connected objects. Integration of these smart devices into standard internet introduces several security threats and attacks to our privacy. This paper presents an overview of IOT architecture, various attacks in each layer and possible countermeasures and further research objectives.
Performance Analysis of Select Forwarding Attack on WSN and its Detection and Removal from Network
Wireless Sensor Networks is quite vulnerable to many security compromising attacks as wormhole attack, message replay or tampering, identity spoofing, black hole attack, eavesdropping, and so on. One of the impacts of se...
The Optimal Carpool Planning Based on IOS Platform
The rapid development of technology has aggravated global warming and air pollution, particularly in metropolises, with high population density. Urban overpopulation has also caused serious traffic problems. The area aro...
E - Learning and Computer-Based Multimedia Intervention and its Education Effect on The Relationship between Knowledge, Attitude and Practices of Rural Women
The study aims to evaluate the relationship among Knowledge, Attitude and Practice scores pre and post intervention. In this E- learning educational intervention study, 130 rural women aged (15-49 years) were randomly se...
Throughput Analysis of TCP Newreno for Multiple Bottlenecks
A very complex problem in the network is –congestion control. It is one of the major problems among top listed network problems. A lot of important data might be àt loss, as a result, resources become wasted. Many TCP mo...
Demystifying Big Data Analytics Techniques
Big Data is relevant for massive amounts of data that do not have the potential to be managed by the traditional information processing techniques. This paper sights on introducing the term big data and illustrating vari...