Internet of things security vulnerabilities and recommended solutions

The applications based on IoT are ubiquitous in providing passive user involvement on the collective approach of sensor technology, embedded system, networking and communication convergence with analytical computing. The application framework of IoT comprises of devices that are highly heterogeneous...

Full description

Bibliographic Details
Main Authors: Olanrewaju, Rashidah Funke, Khan, Burhan ul Islam, Anwar, Farhat, Mir, Roohie Naaz
Format: Article
Language:English
Published: Science Publishing Corporation 2018
Subjects:
Online Access:http://irep.iium.edu.my/70925/
http://irep.iium.edu.my/70925/
http://irep.iium.edu.my/70925/
http://irep.iium.edu.my/70925/1/IJET-23147.pdf
id iium-70925
recordtype eprints
spelling iium-709252019-07-12T07:53:09Z http://irep.iium.edu.my/70925/ Internet of things security vulnerabilities and recommended solutions Olanrewaju, Rashidah Funke Khan, Burhan ul Islam Anwar, Farhat Mir, Roohie Naaz TK7885 Computer engineering The applications based on IoT are ubiquitous in providing passive user involvement on the collective approach of sensor technology, embedded system, networking and communication convergence with analytical computing. The application framework of IoT comprises of devices that are highly heterogeneous and compute migrations from sensor to IoT gateways to edge/fog computing to the cloud and then back to the client along with various alarming components. As observed from the review work, providing security for such networks is in its young stage in the form of an integrated architecture offering perfect security together with network and application possibilities although the shortcomings of IEFT and IEEE contribute more towards the same. Besides, the present researchers have not yet achieved the actual threshold of real-time performance potentials with respect to lesser computational complexity, usage of smaller key size, conformable security, lesser memory overheads, smaller ciphertext size, speedy processing time of algorithms, robust to possible threats and reduced communication/network overhead for ensuring a lighter security mechanism. This paper focusses on the security issues posed by large-scale heterogeneous IoT paradigm and arriving at a secure architectural framework adoptable by a variety of applications that include smart transportation, smart cities, smart healthcare, etc. based on IoT. Science Publishing Corporation 2018 Article PeerReviewed application/pdf en http://irep.iium.edu.my/70925/1/IJET-23147.pdf Olanrewaju, Rashidah Funke and Khan, Burhan ul Islam and Anwar, Farhat and Mir, Roohie Naaz (2018) Internet of things security vulnerabilities and recommended solutions. International Journal of Engineering & Technology, 7 (4). pp. 4899-4904. ISSN 2227-524X https://www.sciencepubco.com/index.php/ijet/article/view/23147 10.14419/ijet.v7i4.23147
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
topic TK7885 Computer engineering
spellingShingle TK7885 Computer engineering
Olanrewaju, Rashidah Funke
Khan, Burhan ul Islam
Anwar, Farhat
Mir, Roohie Naaz
Internet of things security vulnerabilities and recommended solutions
description The applications based on IoT are ubiquitous in providing passive user involvement on the collective approach of sensor technology, embedded system, networking and communication convergence with analytical computing. The application framework of IoT comprises of devices that are highly heterogeneous and compute migrations from sensor to IoT gateways to edge/fog computing to the cloud and then back to the client along with various alarming components. As observed from the review work, providing security for such networks is in its young stage in the form of an integrated architecture offering perfect security together with network and application possibilities although the shortcomings of IEFT and IEEE contribute more towards the same. Besides, the present researchers have not yet achieved the actual threshold of real-time performance potentials with respect to lesser computational complexity, usage of smaller key size, conformable security, lesser memory overheads, smaller ciphertext size, speedy processing time of algorithms, robust to possible threats and reduced communication/network overhead for ensuring a lighter security mechanism. This paper focusses on the security issues posed by large-scale heterogeneous IoT paradigm and arriving at a secure architectural framework adoptable by a variety of applications that include smart transportation, smart cities, smart healthcare, etc. based on IoT.
format Article
author Olanrewaju, Rashidah Funke
Khan, Burhan ul Islam
Anwar, Farhat
Mir, Roohie Naaz
author_facet Olanrewaju, Rashidah Funke
Khan, Burhan ul Islam
Anwar, Farhat
Mir, Roohie Naaz
author_sort Olanrewaju, Rashidah Funke
title Internet of things security vulnerabilities and recommended solutions
title_short Internet of things security vulnerabilities and recommended solutions
title_full Internet of things security vulnerabilities and recommended solutions
title_fullStr Internet of things security vulnerabilities and recommended solutions
title_full_unstemmed Internet of things security vulnerabilities and recommended solutions
title_sort internet of things security vulnerabilities and recommended solutions
publisher Science Publishing Corporation
publishDate 2018
url http://irep.iium.edu.my/70925/
http://irep.iium.edu.my/70925/
http://irep.iium.edu.my/70925/
http://irep.iium.edu.my/70925/1/IJET-23147.pdf
first_indexed 2023-09-18T21:40:40Z
last_indexed 2023-09-18T21:40:40Z
_version_ 1777413118667784192