Successive Security Challenges Implementation on Internet of Things

Abstract

This Paper demonstrates commonly used communication scheme and information retrieval which are carried out via Internet using numerous types of smart devices, can turn the Internet into a very dangerous platform because of its built-in nature of making its users identity easily traceable and discusses some countermeasures that can be used to prevent existing and projected security breaches. It initially provides some introductory information on technology advancement, penetration of the Internet to all aspects of our life and its associated conveniences. It then discusses vulnerability of internet services, presents some typical attack cases that are carried out via smart home appliances, and explains security implementation challenges on such devices from technical, social, and practical aspects. Finally, it proposes an appropriate security model, demonstrates relevant counter measures for numerous attack scenarios, and explains why and how numerous stake holders are needed to get together for its commercial implementation. M. Ann Bency"Successive Security Challenges Implementation on Internet of Things" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018, URL: http://www.ijtsrd.com/papers/ijtsrd8342.pdf http://www.ijtsrd.com/engineering/computer-engineering/8342/successive-security-challenges-implementation-on-internet-of-things/m-ann-bency

Authors and Affiliations

Keywords

Related Articles

Piscicide Effects of Mahua Oil Cake from the Finfish Culture System

The present investigation envisage a study of the effects of pesticides on four fin fishes Oreochromis mossambicus from mahua oil cake, a derived from the plant Madhuca longi folia seed. Although some reports on the effe...

Field Geological and Petrographic Study of Granitic Rocks around Devadurga, Eastern Dharwar Craton, Southern India

Field geological and petrographic characteristics of granitic rocks and their variants exposed at Devadurga town, Raichur district, Karnataka are described. The granitic rocks of Devadurga are part of younger "˜Closepe...

From the History of Trade Relations in the Khanate of Kokand

In the the Khanate of Kokand, which was formed in the early XVIII century, economic life gradually took shape. Domestic and foreign trade has developed and the welfare of the population has increased. In turn, the rulers...

Extraction of Pectin from Mangifera Indica Linn. Indian Mango Fruit Peel

This study extracted pectin from the fruit peels of Mangifera indica Linn. Indian Mango sold in Catarman. The Mango fruit peels pectin has greenish light brown color, sweet dry smell odor and coarse texture. The 0.5 pect...

Comparative Analysis of Heteroscedastic and Homoscedastic OLS Models

This study considered foreign direct investment FDI as response variable while, gross domestic product GDP , inflation and exchange rate were the predictor variables. The data were obtained from the Central Bank of Niger...

Download PDF file
  • EP ID EP359050
  • DOI -
  • Views 87
  • Downloads 0

How To Cite

(2018). Successive Security Challenges Implementation on Internet of Things. International Journal of Trend in Scientific Research and Development, 2(2), -. https://europub.co.uk/articles/-A-359050