Call for Paper - July 2023 Edition
IJCA solicits original research papers for the July 2023 Edition. Last date of manuscript submission is June 20, 2023. Read More

Internet of Things Security based on Devices Architecture

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Taha M. Alfaqih, Jalal Al-Muhtadi

Taha M Alfaqih and Jalal Al-Muhtadi. Article: Internet of Things Security based on Devices Architecture. International Journal of Computer Applications 133(15):19-23, January 2016. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX

	author = {Taha M. Alfaqih and Jalal Al-Muhtadi},
	title = {Article: Internet of Things Security based on Devices Architecture},
	journal = {International Journal of Computer Applications},
	year = {2016},
	volume = {133},
	number = {15},
	pages = {19-23},
	month = {January},
	note = {Published by Foundation of Computer Science (FCS), NY, USA}


The Internet of Things, also called The Internet of Objects, refers to a wireless network between objects; usually the network will be wireless and self-configuring, such as household appliances. Secures IOT end-to-end, which means authenticating device communications, protecting code and applications, and securing devices from threats. Emergence accompanied the IoT technology, or when using of this technology and its deployment, an increase in security and privacy violation, so must take caution when used , and also paid to further research in this technology which that bothered a lot, including confidentiality, authenticity, and integrity. In this paper we will present the security and privacy when using the Internet of Things technology, depending on the architecture of the devices, and will be focusing on how security building in the devices, and protection requirements, by studying the architecture layer and IoT security infrastructure.


  1. A. Zanella, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi, "Internet of things for smart cities," Internet of Things Journal, IEEE, vol. 1, pp. 22-32, 2014.
  2. H. Suo, J. Wan, C. Zou, and J. Liu, "Security in the internet of things: a review," in Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on, 2012, pp. 648-651.
  3. R. H. Weber, "Internet of things: Privacy issues revisited," Computer Law & Security Review, vol. 31, pp. 618-627, 2015.
  4. A. Shipley, "Security in the internet of things, lessons from the past for the connected future," Security Solutions, Wind River, White Paper, 2013.
  5. L. Atzori, A. Iera, G. Morabito, and M. Nitti, "The social internet of things (siot)–when social networks meet the internet of things: Concept, architecture and network characterization," Computer Networks, vol. 56, pp. 3594-3608, 2012.
  6. L. Atzori, A. Iera, and G. Morabito, "The internet of things: A survey," Computer Networks, vol. 54, pp. 2787-2805, 2010.
  7. A. J. Jara, M. A. Zamora, and A. F. Skarmeta, "An internet of things---based personal device for diabetes therapy management in ambient assisted living (AAL)," Personal and Ubiquitous Computing, vol. 15, pp. 431-440, 2011.
  8. S. Babar, P. Mahalle, A. Stango, N. Prasad, and R. Prasad, "Proposed security model and threat taxonomy for the internet of things (IoT)," in Recent Trends in Network Security and Applications, ed: Springer, 2010, pp. 420-429.
  9. O. Vermesan, P. Friess, P. Guillemin, S. Gusmeroli, H. Sundmaeker, A. Bassi, I. S. Jubert, M. Mazura, M. Harrison, and M. Eisenhauer, "Internet of things strategic research roadmap," O. Vermesan, P. Friess, P. Guillemin, S. Gusmeroli, H. Sundmaeker, A. Bassi, et al., Internet of Things: Global Technological and Societal Trends, vol. 1, pp. 9-52, 2011.
  10. L. Tan and N. Wang, "Future internet: The internet of things," in Advanced Computer Theory and Engineering (ICACTE), 2010 3rd International Conference on, 2010, pp. V5-376-V5-380.
  11. D. Uckelmann, M. Harrison, and F. Michahelles, Architecting the internet of things: Springer Science & Business Media, 2011.
  12. L. Da Xu, W. He, and S. Li, "Internet of Things in industries: A survey," Industrial Informatics, IEEE Transactions on, vol. 10, pp. 2233-2243, 2014.
  13. X. Yang, Z. Li, Z. Geng, and H. Zhang, "A multi-layer security model for internet of things," in Internet of Things, ed: Springer, 2012, pp. 388-393.
  14. G. Gang, L. Zeyong, and J. Jun, "Internet of things security analysis," in Internet Technology and Applications (iTAP), 2011 International Conference on, 2011, pp. 1-4.
  15. S. Sharma, A. Sahu, A. Verma, and N. Shukla, "Wireless sensor network security," in Advances in Computer Science and Information Technology. Computer Science and Information Technology, ed: Springer, 2012, pp. 317-326.
  16. C. M. Medaglia and A. Serbanati, "An overview of privacy and security issues in the internet of things," in The Internet of Things, ed: Springer, 2010, pp. 389-395.
  17. S. Peng and H. Shen, "Security Technology Analysis of IOT," in Internet of Things, ed: Springer, 2012, pp. 401-408.
  18. I. Gudymenko and M. Hutter, "Security in the Internet of Things," Proceedings of Intensive Program on Information Communication Security (IPICS 2011), pp. 22-31, 2011.


Internet of Things, RFID, GPS, Privacy, authentication.