Internet of things security vulnerabilities and recommended solutions

The applications based on IoT are ubiquitous in providing passive user involvement on the collective approach of sensor technology, embedded system, networking and communication convergence with analytical computing. The application framework of IoT comprises of devices that are highly heterogeneous...

Full description

Bibliographic Details
Main Authors: Olanrewaju, Rashidah Funke, Khan, Burhan ul Islam, Anwar, Farhat, Mir, Roohie Naaz
Format: Article
Language:English
Published: Science Publishing Corporation 2018
Subjects:
Online Access:http://irep.iium.edu.my/70925/
http://irep.iium.edu.my/70925/
http://irep.iium.edu.my/70925/
http://irep.iium.edu.my/70925/1/IJET-23147.pdf