Open Access Open Access  Restricted Access Subscription Access

A Review on IoT Security Issues and Countermeasures


Affiliations
1 DoS in Computer Science, PG wing of SBRR Mahajana First Grade College, K.R.S. Road, Metagalli, Mysuru, Karnataka-570016, India
 

Internet of things (IoT) is a system of connected physical objects that are accessible through an internet. The things in IoT is an object that assigned with an IP address and have the ability to collect and transfer the data over a network without manual intervention. As IOT does not need any human to machine interaction, it seems to be one of the largest waves of revolution as per the research going on, hence security is needed. The quick development of IOT has derived with the challenges in terms of security of things. This paper focus on the general security issues in IoT and measures used to overcome with those security issues.

Keywords

IoT, Security Issues, Security Measures.
User
Notifications
Font Size

  • R. H. Weber, “Internet of things – new security and privacy challenges,” Computer Law & Security Review, vol. 26, pp. 23-30, 2010.
  • Shao Xiwen “Study on Security Issue of Internet of Things based on RFID” 2012 Fourth International Conference on Computational and Information Sciences.
  • http://whatis.techtarget.com/definition/Internet-of-Things.
  • G. Yang, J. Xu, W. Chen, Z. H. Qi, and H. Y. Wang, “Security characteristic and technology in the internet of things,” Journal of Nanjing University of Posts and Telecommunications (Natural Science), vol. 30, no. 4, Aug 2010.
  • Xu Xiaohui „ Study on Security Problems and Key Technologies of The Internet of Things”, 2013 International Conference on Computational and Information Sciences
  • Benjamin Khoo “RFID as an Enabler of the Internet of Things: Issues of Security and Privacy” 2011 IEEE International Conferences on Internet of Things, and Cyber, Physical and Social Computing.
  • SHEN changxiang, ZHANG Huanguo and FENG Dengguo, “Literature Review of Information Security” Science in China (Series E: Information Sciences), vol.37, no.2, 2007, pp.129-150.
  • N.Gershefeld, R. Krikorian, D.Cohen, “the internet of things”, Scientific American 291(4)(2004) 76-81.
  • Anne James and Joshua Cooper, “Database Architecture for the Internet of Things,” IETE Technical review, vol.26, 2009, pp.311-312.
  • Rolf H. Weber “Internet of Things – New security and privacy challenges” computer law & security review 26(2010) 23 – 30 .
  • Abdemalek Amine, Otmane Ait Mohamed, Boualem Benatellah “Network Security Technologies: Design and Applications”
  • D. Giusto, A. Iera, G. Morabito, L. Atzori (Eds.), “The Internet of Things”, Springer, 2010. ISBN: 978-1-4419-1673-0.
  • H Hui Suo, Jiafu Wan, Caifeng Zou, Jianqi Liu, “Security in the Internet of Things: A Review,” International Conference on Computer Science and Electronics Engineering 2012, IEEE Computer Society.
  • Mayuri A. Bhabad, Sudhir T. Bagade, “Internet of Things: Architecture, Security Issues and Countermeasures,” International Journal of Computer Applications (0975 – 8887) Volume 125 – No.14, September 2015.

Abstract Views: 215

PDF Views: 1




  • A Review on IoT Security Issues and Countermeasures

Abstract Views: 215  |  PDF Views: 1

Authors

J. Yashaswini
DoS in Computer Science, PG wing of SBRR Mahajana First Grade College, K.R.S. Road, Metagalli, Mysuru, Karnataka-570016, India

Abstract


Internet of things (IoT) is a system of connected physical objects that are accessible through an internet. The things in IoT is an object that assigned with an IP address and have the ability to collect and transfer the data over a network without manual intervention. As IOT does not need any human to machine interaction, it seems to be one of the largest waves of revolution as per the research going on, hence security is needed. The quick development of IOT has derived with the challenges in terms of security of things. This paper focus on the general security issues in IoT and measures used to overcome with those security issues.

Keywords


IoT, Security Issues, Security Measures.

References





DOI: https://doi.org/10.13005/ojcst%2F10.02.28