We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

IOT Perception Layer Security and Privacy

by Azza A. A., Hanaa F. M., Maissa A. Elmageed
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 182 - Number 49
Year of Publication: 2019
Authors: Azza A. A., Hanaa F. M., Maissa A. Elmageed
10.5120/ijca2019918755

Azza A. A., Hanaa F. M., Maissa A. Elmageed . IOT Perception Layer Security and Privacy. International Journal of Computer Applications. 182, 49 ( Apr 2019), 25-28. DOI=10.5120/ijca2019918755

@article{ 10.5120/ijca2019918755,
author = { Azza A. A., Hanaa F. M., Maissa A. Elmageed },
title = { IOT Perception Layer Security and Privacy },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2019 },
volume = { 182 },
number = { 49 },
month = { Apr },
year = { 2019 },
issn = { 0975-8887 },
pages = { 25-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume182/number49/30529-2019918755/ },
doi = { 10.5120/ijca2019918755 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:14:47.719999+05:30
%A Azza A. A.
%A Hanaa F. M.
%A Maissa A. Elmageed
%T IOT Perception Layer Security and Privacy
%J International Journal of Computer Applications
%@ 0975-8887
%V 182
%N 49
%P 25-28
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

One of the current challenges in Internet of Things (IOT) security is the choice cryptography algorithms and key management mechanism to be used in the perception (hardware) layer. The purpose of this paper is to study the various security algorithms to achieve security standards (confidentiality, integrity, privacy) on the perception layer of IOT. The study is based on comparing the different characteristics of these algorithms, such as the degree of security of the algorithm, its speed, its achievement of various security standards, and determination of which algorithms are easy to apply to physical devices such as sensors.

References
  1. K. Zhao and L. Ge, "A survey on the internet of things security," in Int'l Conf. on Computational Intelligence and Security (CIS), 663-667, 2013.
  2. Deakin, Mark; Al Waer, Husam (2011). "From Intelligent to Smart Cities". Journal of Intelligent Buildings International: From Intelligent Cities to Smart Cities. 3 (3): 140–152. doi:10.1080/17508975.2011.586671.
  3. Deakin, Mark (22 August 2013). "From intelligent to smart cities". In Deakin, Mark. Smart
  4. Cities: Governing, Modelling and Analysing the Transition. Taylor and Francis. p. 15. ISBN 978-1135124144.
  5. Y. Leng and L. Zhao. Novel design of intelligent internet-of-vehicles management system based on cloud-computing and internet-of-things. In Proceedings of 2011 International Conference on Electronic Mechanical Engineering and Information Technology, volume 6, pages 3190– 3193. IEEE, Aug 2011.
  6. Davis, Jim; Edgar, Thomas; Porter, James; Bernaden, John; Sarli, Michael (2012-12-20). "Smart manufacturing, manufacturing intelligence and demand-dynamic performance". Computers & Chemical Engineering. FOCAPO 2012. 47: 145–156.
  7. Hanaa F. M., Entesar H. I., Azza A. A." Internet of Things Applications and its Security", International Journal of Computer Applications, V.182. No. 41, 2019.
  8. H. Noura. Adaptation of Cryptographic Algorithms According to the Applications Requirements and Limitations: Design, Analyze and Lessons Learned. HDR dissertation, UNIVERSITY of PIERRE MARIE CURIE -Paris VI, 2016.
  9. K. Zhao and L. Ge, "A survey on the internet of things security," in Int'l Conf. on Computational Intelligence and Security (CIS), 663-667, 2013.
  10. M. Leo, F. Battisti, M. Carli, and A. Neri, "A federated architecture approach for Internet of Things security," in Euro Med Telco Conference (EMTC), 1-5, 2014.
  11. L. Atzori, A. Iera, G. Morabito, and M. Nitti, "The social internet of things (sIOT)–when social networks meet the internet of things: Concept, architecture and network characterization," Computer Networks, vol. 56, 3594-3608, 2012.
  12. M.M.Noor, Wan H.H.," Current research on Internet of Things (IOT) security: A survey ", Computer Networks 148 (2019) 283–294
  13. K.E. Emam, F.K. Dankar, "Protecting Privacy Using Anonymity", Journal of the American Medical Informatics ، Volume.15, No. 5, 2008.
  14. C. Liu, Y. Zhang, J. Zeng, L. Peng, R. Chen" ،Research on Dynamical Security Risk Assessment for the Internet of Things inspired by immunology "، Eighth International Conference on Natural Computation (ICNC), 2012.
  15. T. Karygiannis, B. Eydt, G. Barber, L. Bunn, T. Phillips" Guidelinesfor Securing Radio Frequency Identification (RFID) Systems ", National Institute of Standards and Technology.
  16. Henri Gilbert, Helena Handschuh: Security Analysis of SHA-256 and Sisters. Selected Areas in Cryptography 2003: pp175–193.
  17. Goodrich, Oded (2001), Foundations of cryptography I: Basic Tools, Cambridge: Cambridge University Press, ISBN 978-0-511-54689-1
Index Terms

Computer Science
Information Sciences

Keywords

IOT Perception Layer Security.