CFP last date
22 April 2024
Reseach Article

Internet of Things Applications and its Security

by Hanaa F. M., Entesar H. I., Azza A. A.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 182 - Number 41
Year of Publication: 2019
Authors: Hanaa F. M., Entesar H. I., Azza A. A.
10.5120/ijca2019918475

Hanaa F. M., Entesar H. I., Azza A. A. . Internet of Things Applications and its Security. International Journal of Computer Applications. 182, 41 ( Feb 2019), 9-11. DOI=10.5120/ijca2019918475

@article{ 10.5120/ijca2019918475,
author = { Hanaa F. M., Entesar H. I., Azza A. A. },
title = { Internet of Things Applications and its Security },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2019 },
volume = { 182 },
number = { 41 },
month = { Feb },
year = { 2019 },
issn = { 0975-8887 },
pages = { 9-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume182/number41/30364-2019918475/ },
doi = { 10.5120/ijca2019918475 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:13:57.061023+05:30
%A Hanaa F. M.
%A Entesar H. I.
%A Azza A. A.
%T Internet of Things Applications and its Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 182
%N 41
%P 9-11
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Internet of Things (IoT) aims to integrate seamlessly both physical and digital worlds and makes up a new intelligent era of Internet. This technology offers a huge business value for organizations and provides opportunities for many existing applications such as healthcare, smart cities, smart grids, smart building, transportation, and in industrial manufacturing. Security of IoT is very critical issue, so in this paper, number of IoT systems, such as smart healthcare, smart transportation, smart city, and smart manufacturer are explained, also their security requirements are discussed.

References
  1. K. Zhao and L. Ge, "A survey on the internet of things security," in Int'l Conf. on Computational Intelligence and Security (CIS), 663-667, 2013.
  2. L. Atzori, A. Iera, G. Morabito, and M. Nitti, "The social internet of things (siot)–when social networks meet the internet of things: Concept, architecture and network characterization," Computer Networks, vol. 56, 3594-3608, 2012.
  3. M. Leo, F. Battisti, M. Carli, and A. Neri, "A federated architecture approach for Internet of Things security," in Euro Med Telco Conference (EMTC), 1-5, 2014.
  4. M. Rouse, "IoT security (Internet of Things security)," IoT Agenda, 01/11/2015.
  5. P. N. Mahalle, B. Anggorojati, N. R. Prasad, and R. Prasad, "Identity authentication and capability based access control (iacac) for the internet of things," J. of Cyber Security and Mobility, vol. 1, 309-348, 2013.
  6. R. Roman, P. Najera, and J. Lopez, "Securing the internet of things," Computer, vol. 44, 51-58, 2011.
  7. R. Roman, J. Zhou, and J. Lopez, "On the features and challenges of security and privacy in distributed internet of things," Computer Networks, vol. 57, 2266-2279, 2013.
  8. M. Abomhara and G. M. Koien, "Security and privacy in the Internet of Things: Current status and open issues," in Int'l Conference on Privacy and Security in Mobile Systems (PRISMS), 1-8, 2014.
  9. H. Noura. Adaptation of Cryptographic Algorithms According to the Applications Requirements and Limitations : Design, Analyze and Lessons Learned. HDR dissertation, UNIVERSITY of PIERRE MARIE CURIE -Paris VI, 2016.
  10. Y. Leng and L. Zhao. Novel design of intelligent internet-of-vehicles management system based on cloud-computing and internet-of-things. In Proceedings of 2011 International Conference on Electronic Mechanical Engineering and Information Technology, volume 6, pages 3190– 3193. IEEE, Aug 2011.
  11. M. Tilal and R. Minhas. Effects of jamming on ieee 802.11 p systems. Master’s thesis, Chalmers University of Technology, Göteborg, Sweden, November 2010.
  12. Ali Meligy ; Azza A. Abdo ; Ayman Alazab,"P2P Social Network with Dynamic Identity-based Broadcast Encryption using Rolls", International Journal of Computer Applications (0975 – 8887) Volume 102– No.6, September 2014.
Index Terms

Computer Science
Information Sciences

Keywords

IoT M2M security service.