CFP last date
20 May 2024
Reseach Article

Internet of Things: Architecture, Security Issues and Countermeasures

by Mayuri A. Bhabad, Sudhir T. Bagade
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 125 - Number 14
Year of Publication: 2015
Authors: Mayuri A. Bhabad, Sudhir T. Bagade
10.5120/ijca2015906251

Mayuri A. Bhabad, Sudhir T. Bagade . Internet of Things: Architecture, Security Issues and Countermeasures. International Journal of Computer Applications. 125, 14 ( September 2015), 1-4. DOI=10.5120/ijca2015906251

@article{ 10.5120/ijca2015906251,
author = { Mayuri A. Bhabad, Sudhir T. Bagade },
title = { Internet of Things: Architecture, Security Issues and Countermeasures },
journal = { International Journal of Computer Applications },
issue_date = { September 2015 },
volume = { 125 },
number = { 14 },
month = { September },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume125/number14/22497-2015906251/ },
doi = { 10.5120/ijca2015906251 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:16:00.915795+05:30
%A Mayuri A. Bhabad
%A Sudhir T. Bagade
%T Internet of Things: Architecture, Security Issues and Countermeasures
%J International Journal of Computer Applications
%@ 0975-8887
%V 125
%N 14
%P 1-4
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Internet of things (IOT) is widely distributed network of things in which all the information is sent to the internet with the help of sensing devices and Radio Frequency Identification (RFID) tagging system. As IOT does not need any human to machine interaction, it seems to be one of the largest waves of revolution as per the research going on, hence security is needed. But the rapid development of IOT has evolved with the challenges in terms of security of things. This paper is mainly focusing on the concept of IOT, architecture and security issues with suggested countermeasure and suggested further areas of research needed.

References
  1. Conner, Margery (May 27 2010). Sensors empower the "Internet of Things" pp. 32–38. ISSN 0012-7515
  2. Shao Xiwen “Study on Security Issue of Internet of Things based on RFID” 2012 Fourth International Conference on Computational and Information Sciences
  3. http://whatis.techtarget.com/definition/Internet-of-Things
  4. INFSO D.4 Networked Enterprise & RFID INFSO G.2 Micro & Nano systems, in: co-operation with the working group RFID of the ETP EPOSS. Internet of Things in 2020, roadmap for the future, version 1.1, 27 May 2008.
  5. Xu Xiaohui ‘’ Study on Security Problems and Key Technologies of The Internet of Things”, 2013 International Conference on Computational and Information Sciences
  6. Yan L, Zhang Y, Yang L T. The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems. Auerbach Publications, 2008.
  7. Atzori Luigi, Iera Antonio, Morabito, "The Internet of Things: A survey " Computer Networks, v54, n15, October 2010, pp.2787-2805.
  8. Xiong Li, Zhou Xuan, Liu Wen “Research on the Architecture of Trusted Security System Based on the Internet of Things” 2011 Fourth International Conference on Intelligent Computation Technology and Automation
  9. Benjamin Khoo “RFID as an Enabler of the Internet of Things: Issues of Security and Privacy” 2011 IEEE International Conferences on Internet of Things, and Cyber, Physical and Social Computing
  10. Rolf H. Weber “Internet of Things – New security and privacy challenges” computer law & security review 26(2010) 23 – 30
  11. D. Giusto, A. Iera, G. Morabito, L. Atzori (Eds.), The Internet of Things, Springer, 2010. ISBN: 978-1-4419-1673-0.
  12. N. Gershenfeld, R. Krikorian, D. Cohen, The internet of things, Scientific American 291 (4) (2004) 76–81
  13. Abdemalek Amine, Otmane Ait Mohamed, Boualem Benatellah “Network Security Technologies: Design and Applications”
  14. SHEN changxiang, ZHANG Huanguo and FENG Dengguo, “Literature Review of Information Security” Science in China (Series E: Information Sciences), vol.37, no.2, 2007, pp.129-150
  15. WU chuankun, “A Preliminary Investigation on the Security Architecture of the Internet of Things,” Bulletin of Chinese Academy of Sciences, vol 25, no. 4, 2010, pp 411-419.
  16. Anne James and Joshua Cooper, “Database Architecture for the Internet of Things,” IETE Technical Review, vol.26, 2009, pp.311-312.
Index Terms

Computer Science
Information Sciences

Keywords

Internet of Things Wireless Technology Security issues Intelligent System