International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 182 - Number 36 |
Year of Publication: 2019 |
Authors: Abdullah Mohammed Alsaedi |
10.5120/ijca2019918362 |
Abdullah Mohammed Alsaedi . A Comparative Study on Models and Techniques for Securing IoT Applications. International Journal of Computer Applications. 182, 36 ( Jan 2019), 21-25. DOI=10.5120/ijca2019918362
With digitization continuing to enter all aspects of daily life, a growing number of devices and appliances are becoming ‘smart’ and digitally connected. As a result, a large range of IoT applications have been developed and released utilizing a variety of IoT frameworks. All frameworks of IoT environments are composed of a set of procedurals, rules and standards that allow easy implementation and deployment of the various IoT applications. Deploying and implementing these applications necessitates a range of mechanisms and procedurals of security and privacy to ensure proper working and avoid any threats that may occur. This paper introduces a survey of how to secure IoT frameworks through applying a comparative study on a set of basic security mechanisms applied by providing background about security mechanisms, in addition to advantages and disadvantages of each security technique in IoT applications domain.