CFP last date
20 January 2025
Reseach Article

A Comparative Study on Models and Techniques for Securing IoT Applications

by Abdullah Mohammed Alsaedi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 182 - Number 36
Year of Publication: 2019
Authors: Abdullah Mohammed Alsaedi
10.5120/ijca2019918362

Abdullah Mohammed Alsaedi . A Comparative Study on Models and Techniques for Securing IoT Applications. International Journal of Computer Applications. 182, 36 ( Jan 2019), 21-25. DOI=10.5120/ijca2019918362

@article{ 10.5120/ijca2019918362,
author = { Abdullah Mohammed Alsaedi },
title = { A Comparative Study on Models and Techniques for Securing IoT Applications },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2019 },
volume = { 182 },
number = { 36 },
month = { Jan },
year = { 2019 },
issn = { 0975-8887 },
pages = { 21-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume182/number36/30299-2019918362/ },
doi = { 10.5120/ijca2019918362 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:13:28.699360+05:30
%A Abdullah Mohammed Alsaedi
%T A Comparative Study on Models and Techniques for Securing IoT Applications
%J International Journal of Computer Applications
%@ 0975-8887
%V 182
%N 36
%P 21-25
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With digitization continuing to enter all aspects of daily life, a growing number of devices and appliances are becoming ‘smart’ and digitally connected. As a result, a large range of IoT applications have been developed and released utilizing a variety of IoT frameworks. All frameworks of IoT environments are composed of a set of procedurals, rules and standards that allow easy implementation and deployment of the various IoT applications. Deploying and implementing these applications necessitates a range of mechanisms and procedurals of security and privacy to ensure proper working and avoid any threats that may occur. This paper introduces a survey of how to secure IoT frameworks through applying a comparative study on a set of basic security mechanisms applied by providing background about security mechanisms, in addition to advantages and disadvantages of each security technique in IoT applications domain.

References
  1. Nitti, M., Pilloni, V., Colistra, G., & Atzori, L. (2016). The virtual object as a major element of the internet of things: a survey. IEEE Communications Surveys & Tutorials, 18(2), 1228-1240.
  2. Bernabe, J. B., Ramos, J. L. H., & Gomez, A. F. S. (2016). TACIoT: multidimensional trust-aware access control system for the Internet of Things. Soft Computing, 20(5), 1763-1779.
  3. Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer networks, 54(15), 2787-2805.
  4. Singh, S., & Singh, N. (2015). Internet of Things (IoT): Security challenges, business opportunities & reference architecture for E-commerce. In Green Computing and Internet of Things (ICGCIoT), International Conference on (pp. 1577-1581). IEEE.
  5. Mahmoud, R., Yousuf, T., Aloul, F., & Zualkernan, I. (2015). Internet of things (IoT) security: Current status, challenges and prospective measures. In Internet Technology and Secured Transactions (ICITST), 10th International Conference for (pp. 336-341). IEEE.
  6. Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., Qiu, D. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20, 2481-2501.
  7. Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M. (2015). Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys & Tutorials, 17, 2347-2376.
  8. Ashton, K. (2009). "That internet of things’ thing," RFiD Journal, 22, 97-114.
  9. Atzori, L., Iera, A., Morabito, G. (2010). The internet of things: A survey. Computer networks, 54, 2787-2805.
  10. [M. Abomhara and G. M. Koien, (2014) "Security and privacy in the Internet of Things: Current status and open issues," in Int'l Conference on Privacy and Security in Mobile Systems (PRISMS), 1-8.
  11. K. Zhao and L. Ge,2013 "A survey on the internet of things security," in Int'l Conf. on Computational Intelligence and Security (CIS), 663-667.
  12. M. Leo, F. Battisti, M. Carli, and A. Neri, 2014. "A federated architecture approach for Internet of Things security," in Euro Med Telco Conference (EMTC), 1-5.
  13. M. Farooq, M. Waseem, A. Khairi, and S. Mazhar,2015 "A Critical Analysis on the Security Concerns of Internet of Things (IoT)," Perception, vol. 111.
  14. [R. Roman, P. Najera, and J. Lopez, 2011 "Securing the internet of things," Computer, vol. 44, 51-58.
  15. R. Roman, J. Zhou, and J. Lopez,2013. "On the features and challenges of security and privacy in distributed internet of things," Computer Networks, vol. 57, 2266-2279.
  16. Romdhani, Imed & Abdmeziem, Riad & Tandjaoui, D. (2015). Architecting the Internet of Things: State of the Art.
  17. [Samet Tonyali, Kemal Akkaya, Nico Saputro, A. Selcuk Uluagac, Mehrdad Nojoumian, 2018. Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled Smart Metering systems. Future Generation Comp. Syst. 78: 547-557.
  18. Qi Jing, Athanasios V, Vasilakos, Jiafu Wan, Jingwei Lu, Dechao Qui,2014 “Security of the Internet of Things: perspectives and challenges”, Springer, Wireless Networks, vol. 20, Iss.8, pp. 2481–2501.
Index Terms

Computer Science
Information Sciences

Keywords

Internet of Things Security mechanism Security architecture