Peer Reviewed Article
Vol. 3 (2018)
Safety Assessment of IoT: Warning Scan for Security
Jiujiang Vocational and Technical College, China
National University of Singapore, Singapore
Abstract
The Internet of Things (IoT) enables a vast array of entities and applications to assist mankind. Although it is the decade's greatest achievement, it has also spawned cataclysmic scenarios due to security concerns such as threats, vulnerabilities, and attacks on connected and interconnected devices and objects. Companies and organizations are supporting this paradigm change by funding researchers and academics. The internet of things, where trillions of gadgets will be connected, is the hottest industry this decade. IoT is expected to change the way we communicate. The Internet of Things is helping to construct a new and smarter world where everything is under its umbrella. Physical attacks, network attacks, encryption attacks, software attacks, authorization, surveillance, identity theft, vandalism, secure communication, etc. are all serious threats to the internet of things. The most significant worry and aspect of the internet of things is security. With billions or trillions of connected devices, resolving security challenges for future generations will be tough. All IoT security architectures considered in this research lack a security layer.
References
- Adusumalli, H. P. (2016a). Digitization in Production: A Timely Opportunity. Engineering International, 4(2), 73-78.
- Adusumalli, H. P. (2016b). How Big Data is Driving Digital Transformation?. ABC Journal of Advanced Research, 5(2), 131-138.
- Adusumalli, H. P. (2017a). Mobile Application Development through Design-based Investigation. International Journal of Reciprocal Symmetry and Physical Sciences, 4, 14–19.
- Adusumalli, H. P. (2017b). Software Application Development to Backing the Legitimacy of Digital Annals: Use of the Diplomatic Archives. ABC Journal of Advanced Research, 6(2), 121-126.
- Adusumalli, H. P., & Pasupuleti, M. B. (2017). Applications and Practices of Big Data for Development. Asian Business Review, 7(3), 111-116.
- Alberto M. C. Souza, Joseé R. A. Amazonas, An Outlier Detect Algorithm using Big Data Processing and Internet of Things Architecture, Procedia Computer Science, Volume 52, 2015.
- Ande, J. R. P. K., Varghese, A., Mallipeddi, S. R., Goda, D. R., & Yerram, S. R. (2017). Modeling and Simulation of Electromagnetic Interference in Power Distribution Networks: Implications for Grid Stability. Asia Pacific Journal of Energy and Environment, 4(2), 71-80.
- Goda, D. R. (2016). A Fully Analytical Back-gate Model for N-channel Gallium Nitrate MESFET's with Back Channel Implant. California State University, Northridge.
- Lin, C., G. Wu, Enhancing the attacking efficiency of the node capture attackin wsn: a matrix approach, J. Supercomput. 66 (2) (2013) 989–1007.
- Mahadasa, R. (2016). Blockchain Integration in Cloud Computing: A Promising Approach for Data Integrity and Trust. Technology & Management Review, 1, 14-20.
- Mahadasa, R. (2017). Decoding the Future: Artificial Intelligence in Healthcare. Malaysian Journal of Medical and Biological Research, 4(2), 167-174.
- Mahadasa, R., & Surarapu, P. (2016). Toward Green Clouds: Sustainable Practices and Energy-Efficient Solutions in Cloud Computing. Asia Pacific Journal of Energy and Environment, 3(2), 83-88.
- Mallipeddi, S. R., Goda, D. R., Yerram, S. R., Varghese, A., & Ande, J. R. P. K. (2017). Telemedicine and Beyond: Navigating the Frontier of Medical Technology. Technology & Management Review, 2, 37-50.
- Mallipeddi, S. R., Lushbough, C. M., & Gnimpieba, E. Z. (2014). Reference Integrator: a workflow for similarity driven multi-sources publication merging. The Steering Committee of the World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).
- Pasupuleti, M. B. (2015a). Data Science: The Sexiest Job in this Century. International Journal of Reciprocal Symmetry and Physical Sciences, 2, 8–11.
- Pasupuleti, M. B. (2015b). Problems from the Past, Problems from the Future, and Data Science Solutions. ABC Journal of Advanced Research, 4(2), 153-160.
- Pasupuleti, M. B. (2015c). Stimulating Statistics in the Epoch of Data-Driven Innovations and Data Science. Asian Journal of Applied Science and Engineering, 4, 251–254.
- Pasupuleti, M. B. (2016a). Data Scientist Careers: Applied Orientation for the Beginners. Global Disclosure of Economics and Business, 5(2), 125-132.
- Pasupuleti, M. B. (2016b). The Use of Big Data Analytics in Medical Applications. Malaysian Journal of Medical and Biological Research, 3(2), 111-116.
- Pasupuleti, M. B. (2017). AMI Data for Decision Makers and the Use of Data Analytics Approach. Asia Pacific Journal of Energy and Environment, 4(2), 65-70.
- Qian, J., H. Xu and P. Li, "A Novel Secure Architecture for the Internet of Things," 2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS), Ostrawva, 2016, pp. 398-401.
- Sha, K., W. Wei, A. Yang, W. Shi, Security in internet of things: Opportunitiesand challenges, in: Proceedings of International Conference on Identification, Information & Knowledge in the Internet of Things (IIKI 2016), 2016.
- Singh, D., G. Tripathi and A. Jara, "Secure layers-based architecture for Internet of Things," 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), Milan, 2015, 321-326.
- Surarapu, P. (2016). Emerging Trends in Smart Grid Technologies: An Overview of Future Power Systems. International Journal of Reciprocal Symmetry and Theoretical Physics, 3, 17-24.
- Surarapu, P. (2017). Security Matters: Safeguarding Java Applications in an Era of Increasing Cyber Threats. Asian Journal of Applied Science and Engineering, 6(1), 169–176.
- Surarapu, P., & Mahadasa, R. (2017). Enhancing Web Development through the Utilization of Cutting-Edge HTML5. Technology & Management Review, 2, 25-36.
- Vashi, S., J. Ram, J. Modi, S. Verma and C. Prakash, "Internet of Things (IoT): A vision, architectural elements, and security issues," 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, 2017, 492-496.
- Zhang, W., Qu, B. "Security Architecture of the Internet of Things Oriented to Perceptual Layer", International Journal on Computer Consumer and Control (IJ3C), vol. 2, no. 2, 2013.