0% found this document useful (0 votes)
9 views8 pages

Internet of Things (Iot) Applications and Security Challenges: A Review

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 8

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/338138213

Internet of Things (IoT) Applications and Security Challenges: A Review

Article · December 2019

CITATIONS READS

15 586

2 authors:

Mohit Saini Rakesh Kumar Saini


Doon Business School DIT University
10 PUBLICATIONS 44 CITATIONS 63 PUBLICATIONS 58 CITATIONS

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

A STUDY OF PAGE REPLACEMENT ALGORITHMS View project

All content following this page was uploaded by Mohit Saini on 24 December 2019.

The user has requested enhancement of the downloaded file.


Special Issue - 2019 International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
NCRIETS – 2019 Conference Proceedings

Internet of Things (IoT) Applications and


Security Challenges: A Review
Mohit Kumar Saini1 Rakesh Kumar Saini2
1 2
Department of Computer Application, Department of Computer Application,
Doon Business School, Dehradun DIT University, Dehradun
Uttrakhand, India Uttrakhand, India

Abstract-The Internet of Things (IoT) revolutionized the breakfast, there’s not a lot a hacker can do to cause you
global network comprising of people, smart devices, grief. The market is currently focusing on the vertical
intelligent objects, information, and data. It is no secret that domains of IoT since it is in relatively early phases of
as more and more devices connect to the internet, the development. But IoT cannot be treated as a single thing,
challenges of securing the data that they transmit and the
communications that they initiate are becoming more
or single platform, or even a single technology. In order to
profound. Over the years, we have seen a surge in IoT devices, achieve the expected rapid growth from IoT opportunities,
broadly in 2 areas – in homes and in manufacturing. With the more focus needs to be put on interfaces, platforms, mobile
former, we have seen an entire ecosystem built around applications and common/dominant standards [1][2].
Amazon's Echo devices using the Alexa Voice Service. Google,
Microsoft, and Apple have followed suit as well. Since these IoT in the education sector has already started to make the
are independent and closed platforms, the responsibilities of conventional education system more automated —
securing the devices rest with the platform providers. In this interactive smart classrooms are helping students learn and
paper, we highlights cyber security in manufacturing and participate more, whilst automatic attendance and various
related industries. Industries such as manufacturing, oil &
gas, refining, pharmaceuticals, food & beverage, water
student tracking systems could help to make schools more
treatment, and many more are constantly looking to add the secure. Internet-enabled remote classrooms will be a
right layers of security, as they bring an increasing number of milestone for developing countries, making deep
equipment and devices online. Device manufacturers and penetration in areas where setting up a traditional school
plant operations managers constantly face pressure to protect infrastructure is not possible. Internet-enabled
their physical assets from cyber threats. Moreover, for each of manufacturing and industrial units are giving
these industries, the nature of the data, topologies of IoT differentiating results, making them safer and more
devices, and complexities of threat management and ensuring efficient through automated process controls. Plant and
compliance vary widely. energy optimization, health and safety control and security
Keywords-- Internet of Things, Cyber-attack, Security threats.
management are now increasingly being provided by
advanced sensors, networked with sophisticated
I. INTRODUCTION microcomputers [3][4]. Financial services are already
leveraging the internet for many of their services.
The recent rapid development of the Internet of Things Exponential improvement in digital infrastructure and the
(IoT) and its ability to offer different types of services have next generation of IoT enabled products could further lead
made it the fastest growing technology, with huge impact the growth of the financial sector, with innovations, such as
on social life and business environments. Internet of Things smart wearable and smart monitoring devices, helping
(IoT) devices are rapidly becoming ubiquitous while IoT customers to keep better track of their money and
services are becoming pervasive. Their success has not investments. Telcos could face a surge in data usage due to
gone unnoticed and the number of threats and attacks IoT-enabled devices, thus raising their ARPU (average
against IoT devices and services are on the increase as revenue per user), while on the other hand, they will also
well. have to deal with some concerns, such as privacy and
The Internet of Things (IoT) is an idea that could radically infrastructure security. While the possibilities of these new
alter our relationship with technology. The promise of a technologies are mind-boggling, they also reveal severe
world in which all of the electronic devices around us are IoT cybersecurity challenges. During the last few years,
part of a single, interconnected network was once a thing of we’ve seen a dramatic increase in the number and the
science fiction. But IoT has not only entered the world of sophistication of attacks targeting IoT devices. The
nonfiction; it’s taking the world by storm. IoT devices are interconnectivity of people, devices and organizations in
no longer a niche market. They have started to move from today’s digital world, opens up a whole new playing field
our workspaces into our (smart) homes, where IoT devices of vulnerabilities — access points where the cyber
are expected to have the most significant impact on our criminals can get in. The overall risk “landscape” of the
daily lives. Most smart home devices will be benign, organization is only a part of a potentially contradictory
everyday appliances like kettles and toasters. Even if these and opaque universe of actual and potential threats that all
devices are hacked and compromised, short of ruining your too often come from completely unexpected and

Volume 7, Issue 12 Published by, www.ijert.org 1


Special Issue - 2019 International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
NCRIETS – 2019 Conference Proceedings

unforeseen threat actors, which can have an escalating product experience smart. Consider Misfit Shine, a fitness
effect. In this paper discussed various security challenges tracker, compared to Nest’s intelligent thermostat. The
in IOT. The main contribution of this paper is to provide an Shine experience distributes compute tasks between a
overview of the current state of IoT security challenges [5]. smartphone and the cloud. The Nest thermostat has more
compute horsepower for the AI that make them smart.
II. INTERNET OF THINGS (IOT)
(b) Connectivity
The internet of things, or IoT, is a system of interrelated Connectivity empowers Internet of Things by bringing
computing devices, mechanical and digital machines, together everyday objects. Connectivity of these objects is
objects, animals or people that are provided with unique pivotal because simple object level interactions contribute
identifiers (UIDs) and the ability to transfer data over a towards collective intelligence in IoT network. It enables
network without requiring human-to-human or human-to- network accessibility and compatibility in the things. With
computer interaction A thing in the internet of things can this connectivity, new market opportunities for Internet of
be a person with a heart monitor implant, a farm animal things can be created by the networking of smart things and
with a biochip transponder, an automobile that has built- applications. Connectivity in the IoT is more than slapping
in sensors to alert the driver when tire pressure is low or on a WiFi module and calling it a day. Connectivity
any other natural or man-made object that can be assigned enables network accessibility and compatibility.
an IP address and is able to transfer data over a Accessibility is getting on a network while compatibility
network[6][7]. provides the common ability to consume and produce data.
If this sounds familiar, that’s because it is Metcalfe’s Law
Increasingly, organizations in a variety of industries are and it rings true for IoT [10].
using IoT to operate more efficiently, better understand
customers to deliver enhanced customer service, improve (c) Dynamic Nature
decision-making and increase the value of the business [9]. The primary activity of Internet of Things is to collect data
from its environment, this is achieved with the dynamic
The internet of things (IoT) is a computing concept that changes that take place around the devices. The state of
describes the idea of everyday physical objects being these devices change dynamically, example sleeping and
connected to the internet and being able to identify waking up, connected and/or disconnected as well as the
themselves to other devices. The term is closely identified context of devices including temperature, location and
with RFID as the method of communication, although it speed. In addition to the state of the device, the number of
also may include other sensor technologies, wireless devices also changes dynamically with a person, place and
technologies or QR codes. time.

III. CHARACTERISTICS OF INTERNET The state of devices change dynamically, e.g., sleeping and
OF THINGS (IOT) waking up, connected and/or disconnected as well as the
context of devices including location and speed. Moreover,
Some most popular characteristics of Internet of things are: the number of devices can change dynamically [11].

(a) Intelligence (d) Enormous scale


(b) Connectivity The number of devices that need to be managed and that
(c) Dynamic Nature communicate with each other will be much larger than the
(d) Enormous scale devices connected to the current Internet. The management
(e) Sensing of data generated from these devices and their
(f) Heterogeneity interpretation for application purposes becomes more
(g) Security critical. Gartner (2015) confirms the enormous scale of IoT
in the estimated report where it stated that 5.5 million new
(a) Intelligence things will get connected every day and 6.4 billion
IoT comes with the combination of algorithms and connected things will be in use worldwide in 2016, which
computation, software & hardware that makes it smart. is up by 30 percent from 2015. The report also forecasts
Ambient intelligence in IoT enhances its capabilities which that the number of connected devices will reach 20.8
facilitate the things to respond in an intelligent way to a billion by 2020.
particular situation and supports them in carrying out
specific tasks. In spite of all the popularity of smart The number of devices that need to be managed and that
technologies, intelligence in IoT is only concerned as communicate with each other will be at least an order of
means of interaction between devices, while user and magnitude larger than the devices connected to the current
device interaction is achieved by standard input methods Internet. Even more critical will be the management of the
and graphical user interface [8]. data generated and their interpretation for application
purposes. This relates to semantics of data, as well as
Together algorithms and compute (i.e. software & efficient data handling.
hardware) provide the “intelligent spark” that makes a

Volume 7, Issue 12 Published by, www.ijert.org 2


Special Issue - 2019 International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
NCRIETS – 2019 Conference Proceedings

(e) Sensing (a) Connected Health (Digital Health/Tele


IoT wouldn’t be possible without sensors which will detect health/Telemedicine)
or measure any changes in the environment to generate IoT has various applications in healthcare, which are from
data that can report on their status or even interact with the remote monitoring equipment to advance & smart sensors
environment. Sensing technologies provide the means to to equipment integration. It has the potential to improve
create capabilities that reflect a true awareness of the how physicians deliver care and also keep patients safe and
physical world and the people in it. The sensing healthy. Healthcare IoT can allow patients to spend more
information is simply the analogue input from the physical time interacting with their doctors by which it can boost
world, but it can provide the rich understanding of our patient engagement and satisfaction. From personal fitness
complex world [12] [13]. sensors to surgical robots, IoT in healthcare brings new
tools updated with the latest technology in the ecosystem
We tend to take for granted our senses and ability to that helps in developing better healthcare. IoT helps in
understand the physical world and people around us. revolutionizing healthcare and provides pocket-friendly
Sensing technologies provide us with the means to create solutions for the patient and healthcare professional
experiences that reflect a true awareness of the physical [15][16].
world and the people in it. This is simply the analog input
from the physical world, but it can provide rich
understanding of our complex world.

(f) Heterogeneity
Heterogeneity in Internet of Things as one of the key
characteristics. Devices in IoT are based on different
hardware platforms and networks and can interact with
other devices or service platforms through different
networks. IoT architecture should support direct network
connectivity between heterogeneous networks. The key
design requirements for heterogeneous things and their
environments in IoT are scalabilities, modularity,
extensibility and interoperability. The devices in the IoT
are heterogeneous as based on different hardware platforms
and networks. They can interact with other devices or
service platforms through different networks [14].
Figure 1: Connected Health
(g) Security
IoT devices are naturally vulnerable to security threats. As Connected healthcare yet remains the sleeping giant of the
we gain efficiencies, novel experiences, and other benefits Internet of Things applications. The concept of connected
from the IoT, it would be a mistake to forget about security healthcare system and smart medical devices bears
concerns associated with it. There is a high level of enormous potential not just for companies, but also for the
transparency and privacy issues with IoT. It is important to well-being of people in general. Research shows IoT in
secure the endpoints, the networks, and the data that is healthcare will be massive in coming years. IoT in
transferred across all of it means creating a security healthcare is aimed at empowering people to live healthier
paradigm. life by wearing connected devices. The collected data will
help in personalized analysis of an individual’s health and
IV. APPLICATIONS OF INTERNET OF THINGS provide tailor made strategies to combat illness. The video
(IOT) below explains how IoT can revolutionize treatment and
medical help.
Some useful applications of Internet of Things (IOT) are:
(b) Smart City
(a) Connected Health Smart city is another powerful application of IoT
(b) Smart City generating curiosity among world’s population. Smart
(c) Connected Cars surveillance, smarter energy management systems,
(d) Smart Home automated transportation, water distribution, urban security
(e) Smart Farming and environmental monitoring all are examples of internet
(f) Smart Retail of things applications for smart cities. IoT will solve major
(g) Smart Supply Chain problems faced by the people living in cities like pollution,
traffic congestion and shortage of energy supplies etc.
Products like cellular communication enabled Smart Belly
trash will send alerts to municipal services when a bin
needs to be emptied [17].

Volume 7, Issue 12 Published by, www.ijert.org 3


Special Issue - 2019 International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
NCRIETS – 2019 Conference Proceedings

vehicles that are being successfully tested on our highways


right now.

(d) Smart Home


Smart Home has become the revolutionary ladder of
success in the residential spaces and it is predicted Smart
homes will become as common as smartphones Whenever
we think of IoT systems, the most important and efficient
application that stands out every time is Smart Home
ranking as highest IOT application on all channels. The
estimated amount of funding for Smart Home startups
exceeds $2.5bn and is ever growing. Wouldn’t you love if
you could switch on air conditioning before reaching home
or switch off lights even after you have left home? Or
unlock the doors to friends for temporary access even when
you are not at home. Don’t be surprised with IoT taking
Figure 2: Smart City
shape companies are building products to make your life
simpler and convenient [11].
By installing sensors and using web applications, citizens
can find free available parking slots across the city. Also,
the sensors can detect meter tampering issues, general
malfunctions and any installation issues in the electricity
system.

(c) Connected Cars


The automotive digital technology has focused on
optimizing vehicles internal functions. But now, this
attention is growing towards enhancing the in-car
experience. A connected car is a vehicle which is able to
optimize its own operation, maintenance as well as comfort
of passengers using onboard sensors and internet
connectivity. Most large auto makers as well as some brave
startups are working on connected car solutions.
Major brands like Tesla, BMW, Apple, and Google are
working on bringing the next revolution in automobiles
Figure 4: Smart Home
[18].
The cost of owning a house is the biggest expense in a
homeowner’s life. Smart Home products are promised to
save time, energy and money. With Smart home companies
like Nest, Ecobee, Ring and August, to name a few, will
become household brands and are planning to deliver a
never seen before experience [19].

(e) Smart Farming


Smart farming is an often overlooked IoT application.
However, because the number of farming operations is
usually remote and the large number of livestock that
farmers work on, all of this can be monitored by the
Internet of Things and can also revolutionize the way
farmers work. But this idea is yet to reach a large-scale
attention. Nevertheless, it still remains to be one of the IoT
Figure 3: Connected Cars
applications that should not be underestimated. Smart
farming has the potential to become an important
Connected car technology is a vast and an extensive
application field specifically in the agricultural-product
network of multiple sensors, antennas, embedded software,
exporting countries.
and technologies that assist in communication to navigate
in our complex world. It has the responsibility of making
decisions with consistency, accuracy, and speed. It also has
to be reliable. These requirements will become even more
critical when humans give up entirely the control of the
steering wheel and brakes to the autonomous or automated

Volume 7, Issue 12 Published by, www.ijert.org 4


Special Issue - 2019 International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
NCRIETS – 2019 Conference Proceedings

factory equipment that contains embedded sensors


communicate data about different parameters such as
pressure, temperature, and utilization of the machine. The
IoT system can also process workflow and change
equipment settings to optimize performance [21].

Figure 5: Smart Farming

(f) Smart Retail


Retailers have started adopting IoT solutions and using IoT
embedded systems across a number of applications that
improve store operations such as increasing purchases,
reducing theft, enabling inventory management, and
enhancing the consumer’s shopping experience. Through Figure 7: Smart Supply Chain
IoT physical retailers can compete against online
challengers more strongly. They can regain their lost
market share and attract consumers into the store, thus V. SECURITY CHALLENGES FACING IOT
making it easier for them to buy more while saving money
[20]. IoT security is the protection of Internet of Things devices
from attack. While many business owners are aware that
they need to protect computers and phones with antivirus,
the security risks related to IoT devices are less well known
and their protection is too often neglected.

Internet of Things devices are everywhere. From cars and


fridges to monitoring devices on assembly lines, objects
around us are increasingly being connected to the internet.
The speed at which the IoT market is growing is staggering
- Juniper research estimates that the number of IoT sensors
and devices is set to exceed 50 billion by 2022.While
consumer IoT devices allow lifestyle benefits, businesses
are quickly adopting IoT devices due to high potential for
savings. For example, after Harley-Davidson turned their
York, Pennsylvania plant to a ‘smart factory’ using IoT
devices in every step of the production process,
they reduced costs by 7% and increased net margin by
Figure 6: Smart Farming 19%.
The potential of IoT in the retail sector is enormous. IoT (a) Data Integrity
provides an opportunity to retailers to connect with the Billions of devices come under the umbrella of an
customers to enhance the in-store experience. Smartphones interlinked ecosystem that is connected through IoT.
will be the way for retailers to remain connected with their Manipulating even a single data point will result in
consumers even out of store. Interacting through manipulation of the entire data which is exchanged and
Smartphones and using Beacon technology can help shared back and forth from the sensor to the main server.
retailers serve their consumers better. They can also track Decentralized distributed ledger and digital signatures
consumer’s path through a store and improve store layout should be implemented in order to ensure integrity [24].
and place premium products in high traffic areas [17].
(b) Encryption Capabilities
(g) Smart Supply Chain Data encryption and decryption is a continuous process.
Supply chains have already been getting smarter for a The IoT network’s sensors still lack the capability to
couple of years. Offering solutions to problems like process. The brute force attempts can be prevented by
tracking of goods while they are on the road or in transit, or firewalls and segregating the devices into separate
helping suppliers exchange inventory information are some networks.
of the popular offerings. With an IoT enabled system,

Volume 7, Issue 12 Published by, www.ijert.org 5


Special Issue - 2019 International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
NCRIETS – 2019 Conference Proceedings

(c) Privacy Issues VI. CONCLUSION


IoT is all about the exchange of data among various
platforms, devices, and consumers. The smart devices The IoT framework is vulnerable to attacks at each layer.
gather data for a number of reasons, like, improving Therefore, there are many security threats and requirements
efficiency and experience, decision making, providing that need to be dispatched. Current state of research in IoT
better service, etc.; thus, the end point of data shall be is mainly concentrated on authentication and access control
completely secured and safeguarded. protocols, but with the rapid growth of technology it is
essential to consolidate new networking protocols like IPv6
(d) Common Framework and 5G to achieve the progressive mash up of IoT topology
There is an absence of a common framework and so all the The main emphasis of this chapter was to highlight major
manufacturers have to manage the security and retain the security issues of IoT particularly, focusing the security
privacy on their own. Once a common standardized attacks and their countermeasures. Due to lack of security
framework is implemented, the individual efforts will then mechanism in IoT devices, many IoT devices become soft
collectively be utilized in an expandable manner and so targets and even this is not in the victim’s knowledge of
reusability of code can be achieved [23]. being infected. In this chapter, the security requirements
are discussed such as confidentiality, integrity, and
authentication, etc. In this paper, different applications of
IOT are discussed. We hope this paper will be useful to
researchers in the security field by helping identify the
major issues in IoT security and providing better
understanding of the threats and their attributes originating
from various intruders like organizations and intelligence
agencies.
ETHICS
This Research paper is original and not published in any
conferences or in any journal.

REFERENCES

Figure 8: Security Challenges Facing IoT [1] R.Vignesh and 2A.Samydurai ans1 Student, 2Associate Professor
Security on Internet of Things (IOT) with Challenges and
Countermeasures in 2017 IJEDR | Volume 5, Issue 1 | ISSN:
(e) Automation 2321-9939.
Eventually, enterprises will have to deal with more and [2] N. Koblitz, "Elliptic curve cryptosystems," Mathematics of
more number of IoT devices. This enormous amount of computation, vol. 48, 203-209, 1987.
[3] J.-Y. Lee, W.-C.Lin, and Y.-H. Huang, "A lightweight
user data can be difficult to manage. The fact cannot be authentication protocol for internet of things," in Int'l Symposium
denied that it requires a single error or trespassing a single on Next-Generation Electronics (ISNE), 1-2, 2014.
algorithm to bring down the entire infrastructure of the data [4] Y. Xie and D. Wang, "An Item-Level Access Control Framework
[22]. for Inter-System Security in the Internet of Things," in Applied
Mechanics and Materials, 1430-1432, 2014.
[5] B. Anggorojati, P. N. Mahalle, N. R. Prasad, and R. Prasad,
(f) Updations "Capability-based access control delegation model on the
Managing the update of millions of devices needs to be federated IoT network," in Int'l Symposium on Wireless Personal
adhered to, respectively. Not all the devices support over Multimedia Communications (WPMC), 604-608, 2012.
[6] M. Castrucci, A. Neri, F. Caldeira, J. Aubert, D. Khadraoui, M.
the air update and hence it requires manually updating the Aubigny, et al., "Design and implementation of a mediation
devices. One will need to keep a track of the available system enabling secure communication among Critical
updates and apply the same to all the varied devices. This Infrastructures," Int'l Journal of Critical Infrastructure Protection,
process becomes time-consuming and complicated and if vol. 5,86-97, 2012.
[7] R. Neisse, G. Steri, and G. Baldini, "Enforcement of security
any mistake happens in the process than this shall lead to policy rules for the internet of things," in Int'l Conference on
loopholes in the security later. Security Investment in Wireless and Mobile Computing, Networking and
securing infrastructure and network should be the first Communications (WiMob), 165-172, 2014.
priority, which is not the case now. IoT involves the use of [8] Mirza Abdur Razzaq and Muhammad Ali Qureshi “Security
Issues in the Internet of Things (IoT): A Comprehensive Study”
millions of data points and each point should be secured. by (IJACSA) International Journal of Advanced Computer
Indeed, the need is for the multi-layer security, i.e., security Science and Applications, Vol. 8, No. 6, 2017.
at each and every level. From end-point devices, cloud [9] J. S. Kumar and D. R. Patel, “A survey on internet of things:
platforms, embedded software to web and mobile Security and privacy issues,” International Journal of Computer
Applications, vol. 90, no. 11, 2014.
applications that leverage IoT (Internet of Things), each [10] M. Abomhara and G. M. Køien, “Security and privacy in the
layer should be security intact. With the set of internet of things: Current status and open issues,” in Privacy and
heterogeneous devices, security becomes complex. Security in Mobile Systems (PRISMS), International Conference
on. IEEE, 2014, pp. 1–8.
[11] S. Chen, H. Xu, D. Liu, B. Hu, and H. Wang, “A vision of iot:
Applications, challenges, and opportunities with china

Volume 7, Issue 12 Published by, www.ijert.org 6


Special Issue - 2019 International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
NCRIETS – 2019 Conference Proceedings

perspective,”IEEE Internet of Things journal, vol. 1, no. 4, pp.


349–359, 2014.
[12] L. Atzori, A. Iera, and G. Morabito, “The internet of things: A
survey,”Comput. Netw. vol. 54, no. 15, pp. 2787–2805, Oct 2010.
[13] M. M. Hossain, M. Fotouhi, and R. Hasan, “Towards an analysis
of security issues, challenges, and open problems in the internet
of things,” in Services (SERVICES), 2015 IEEE World Congress
on. IEEE, 2015, pp. 21–28.
[14] L. Da Xu, W. He, and S. Li, “Internet of things in industries: A
survey,”IEEE Transactions on industrial informatics, vol. 10, no.
4, pp. 2233–2243, 2014.
[15] L. M. R. Tarouco, L. M. Bertholdo, L. Z. Granville, L. M. R.
Arbiza, F. Carbone, M. Marotta, and J. J. C. de Santana, “Internet
of things in healthcare: Interoperatibility and security issues,” in
Communications (ICC), IEEE International Conference on. IEEE,
2012, pp. 6121–6125.
[16] A. Mohan, “Cyber security for personal medical devices internet
of things,” in Distributed Computing in Sensor Systems
(DCOSS), 2014 IEEE International Conference on. IEEE, 2014,
pp. 372–374.
[17] Mohamed Abomhara and Geir M. Køien” Cyber Security and the
Internet of Things: Vulnerabilities, Threats, Intruders and
Attacks”.
[18] S. De, P. Barnaghi, M. Bauer, and S. Meissner, “Service
modelling for the internet of things,” in Computer Science and
Information Systems (FedCSIS), 2011 Federated Conference on.
IEEE, 2011, pp. 949–955.
[19] G. Xiao, J. Guo, L. Xu, and Z. Gong, “User interoperability with
heterogeneous iot devices through transformation,” 2014.
[20] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of
things (iot): A vision, architectural elements, and future
directions, “Future Generation Computer Systems, vol. 29, no. 7,
pp. 1645–1660, 2013.
[21] M. Zorzi, A. Gluhak, S. Lange, and A. Bassi, “From today’s
intranet of things to a future internet of things: a wireless-and
mobility-related view,” Wireless Communications, IEEE, vol. 17,
no. 6, pp. 44–51,2010.
[22] C. Hong song, F. Zhongchuan, and Z. Dongyan, “Security and
trust research in m2m system,” in Vehicular Electronics and
Safety (ICVES), 2011 IEEE International Conference on. IEEE,
2011, pp. 286–290.
[23] I. Cha, Y. Shah, A. U. Schmidt, A. Leicher, and M. V.
Meyerstein, “Trust in m2 communication,” Vehicular Technology
Magazine, IEEE, vol. 4,no. 3, pp. 69–75, 2009.
[24] J. Lopez, R. Roman, and C. Alcaraz, “Analysis of security threats,
requirements, technologies and standards in wireless sensor
networks.

Volume 7, Issue 12 Published by, www.ijert.org 7

View publication stats

You might also like