Security Issues in the Internet of Things (IoT): A Comprehensive Study
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 6
Abstract
Wireless communication networks are highly prone to security threats. The major applications of wireless communication networks are in military, business, healthcare, retail, and transportations. These systems use wired, cellular, or adhoc networks. Wireless sensor networks, actuator networks, and vehicular networks have received a great attention in society and industry. In recent years, the Internet of Things (IoT) has received considerable research attention. The IoT is considered as future of the internet. In future, IoT will play a vital role and will change our living styles, standards, as well as business models. The usage of IoT in different applications is expected to rise rapidly in the coming years. The IoT allows billions of devices, peoples, and services to connect with others and exchange information. Due to the increased usage of IoT devices, the IoT networks are prone to various security attacks. The deployment of efficient security and privacy protocols in IoT networks is extremely needed to ensure confidentiality, authentication, access control, and integrity, among others. In this paper, an extensive comprehensive study on security and privacy issues in IoT networks is provided.
Authors and Affiliations
Mirza Abdur Razzaq, Sajid Habib Gill, Muhammad Ali Qureshi, Saleem Ullah
Validating Utility of TEIM: A Comparative Analysis
Concrete efforts to integrate Software Engineering and Human Computer Interaction exist in the form of models by many researchers. An unconventional model called TEIM (The Evolved Integrated Model) of Software Engineerin...
Arabic Alphabet and Numbers Sign Language Recognition
This paper introduces an Arabic Alphabet and Numbers Sign Language Recognition (ArANSLR). It facilitates the communication between the deaf and normal people by recognizing the alphabet and numbers signs of Arabic sign l...
Non-Linear Energy Harvesting Dual-hop DF Relaying System over n-µ Fading Channels
In this work, we analyze a wireless energy harvest-ing decode-and-forward (DF) relaying network with beamforming that is based on a practical non-linear energy harvesting model over η-μ fading channels. We consider a dua...
Memetic Multi-Objective Particle Swarm Optimization-Based Energy-Aware Virtual Network Embedding
In cloud infrastructure, accommodating multiple virtual networks on a single physical network reduces power consumed by physical resources and minimizes cost of operating cloud data centers. However, mapping multiple vir...
A Comparative study of Arabic handwritten characters invariant feature
this paper is practically interested in the unchangeable feature of Arabic handwritten character. It presents results of comparative study achieved on certain features extraction techniques of handwritten cha...