Internet of things security vulnerabilities and recommended solutions
The applications based on IoT are ubiquitous in providing passive user involvement on the collective approach of sensor technology, embedded system, networking and communication convergence with analytical computing. The application framework of IoT comprises of devices that are highly heterogeneous...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Science Publishing Corporation
2018
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/70925/ http://irep.iium.edu.my/70925/ http://irep.iium.edu.my/70925/ http://irep.iium.edu.my/70925/1/IJET-23147.pdf |
id |
iium-70925 |
---|---|
recordtype |
eprints |
spelling |
iium-709252019-07-12T07:53:09Z http://irep.iium.edu.my/70925/ Internet of things security vulnerabilities and recommended solutions Olanrewaju, Rashidah Funke Khan, Burhan ul Islam Anwar, Farhat Mir, Roohie Naaz TK7885 Computer engineering The applications based on IoT are ubiquitous in providing passive user involvement on the collective approach of sensor technology, embedded system, networking and communication convergence with analytical computing. The application framework of IoT comprises of devices that are highly heterogeneous and compute migrations from sensor to IoT gateways to edge/fog computing to the cloud and then back to the client along with various alarming components. As observed from the review work, providing security for such networks is in its young stage in the form of an integrated architecture offering perfect security together with network and application possibilities although the shortcomings of IEFT and IEEE contribute more towards the same. Besides, the present researchers have not yet achieved the actual threshold of real-time performance potentials with respect to lesser computational complexity, usage of smaller key size, conformable security, lesser memory overheads, smaller ciphertext size, speedy processing time of algorithms, robust to possible threats and reduced communication/network overhead for ensuring a lighter security mechanism. This paper focusses on the security issues posed by large-scale heterogeneous IoT paradigm and arriving at a secure architectural framework adoptable by a variety of applications that include smart transportation, smart cities, smart healthcare, etc. based on IoT. Science Publishing Corporation 2018 Article PeerReviewed application/pdf en http://irep.iium.edu.my/70925/1/IJET-23147.pdf Olanrewaju, Rashidah Funke and Khan, Burhan ul Islam and Anwar, Farhat and Mir, Roohie Naaz (2018) Internet of things security vulnerabilities and recommended solutions. International Journal of Engineering & Technology, 7 (4). pp. 4899-4904. ISSN 2227-524X https://www.sciencepubco.com/index.php/ijet/article/view/23147 10.14419/ijet.v7i4.23147 |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
TK7885 Computer engineering |
spellingShingle |
TK7885 Computer engineering Olanrewaju, Rashidah Funke Khan, Burhan ul Islam Anwar, Farhat Mir, Roohie Naaz Internet of things security vulnerabilities and recommended solutions |
description |
The applications based on IoT are ubiquitous in providing passive user involvement on the collective approach of sensor technology, embedded system, networking and communication convergence with analytical computing. The application framework of IoT comprises of devices that are highly heterogeneous and compute migrations from sensor to IoT gateways to edge/fog computing to the cloud and then back to the client along with various alarming components. As observed from the review work, providing security for such networks is in its young stage in the form of an integrated architecture offering perfect security together with network and application possibilities although the shortcomings of IEFT and IEEE contribute more towards the same. Besides, the present researchers have not yet achieved the actual threshold of real-time performance potentials with respect to lesser computational complexity, usage of smaller key size, conformable security, lesser memory overheads, smaller ciphertext size, speedy processing time of algorithms, robust to possible threats and reduced communication/network overhead for ensuring a lighter security mechanism. This paper focusses on the security issues posed by large-scale heterogeneous IoT paradigm and arriving at a secure architectural framework adoptable by a variety of applications that include smart transportation, smart cities, smart healthcare, etc. based on IoT. |
format |
Article |
author |
Olanrewaju, Rashidah Funke Khan, Burhan ul Islam Anwar, Farhat Mir, Roohie Naaz |
author_facet |
Olanrewaju, Rashidah Funke Khan, Burhan ul Islam Anwar, Farhat Mir, Roohie Naaz |
author_sort |
Olanrewaju, Rashidah Funke |
title |
Internet of things security vulnerabilities and recommended solutions |
title_short |
Internet of things security vulnerabilities and recommended solutions |
title_full |
Internet of things security vulnerabilities and recommended solutions |
title_fullStr |
Internet of things security vulnerabilities and recommended solutions |
title_full_unstemmed |
Internet of things security vulnerabilities and recommended solutions |
title_sort |
internet of things security vulnerabilities and recommended solutions |
publisher |
Science Publishing Corporation |
publishDate |
2018 |
url |
http://irep.iium.edu.my/70925/ http://irep.iium.edu.my/70925/ http://irep.iium.edu.my/70925/ http://irep.iium.edu.my/70925/1/IJET-23147.pdf |
first_indexed |
2023-09-18T21:40:40Z |
last_indexed |
2023-09-18T21:40:40Z |
_version_ |
1777413118667784192 |