CFP last date
20 June 2024
Reseach Article

A Survey on Internet of Things: Security and Privacy Issues

by J. Sathish Kumar, Dhiren R. Patel
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 90 - Number 11
Year of Publication: 2014
Authors: J. Sathish Kumar, Dhiren R. Patel

J. Sathish Kumar, Dhiren R. Patel . A Survey on Internet of Things: Security and Privacy Issues. International Journal of Computer Applications. 90, 11 ( March 2014), 20-26. DOI=10.5120/15764-4454

@article{ 10.5120/15764-4454,
author = { J. Sathish Kumar, Dhiren R. Patel },
title = { A Survey on Internet of Things: Security and Privacy Issues },
journal = { International Journal of Computer Applications },
issue_date = { March 2014 },
volume = { 90 },
number = { 11 },
month = { March },
year = { 2014 },
issn = { 0975-8887 },
pages = { 20-26 },
numpages = {9},
url = { },
doi = { 10.5120/15764-4454 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-06T22:10:46.177312+05:30
%A J. Sathish Kumar
%A Dhiren R. Patel
%T A Survey on Internet of Things: Security and Privacy Issues
%J International Journal of Computer Applications
%@ 0975-8887
%V 90
%N 11
%P 20-26
%D 2014
%I Foundation of Computer Science (FCS), NY, USA

This paper introduces Internet of Things (IoTs), which offers capabilities to identify and connect worldwide physical objects into a unified system. As a part of IoTs, serious concerns are raised over access of personal information pertaining to device and individual privacy. This survey summarizes the security threats and privacy concerns of IoT. .

  1. C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos, "Context Aware Computing for The Internet of Things: A Survey" IEEE Communications Surveys & Tutorials, 2013, pp. 1-41
  2. G. Gang, L. Zeyong, and J. Jun, "Internet of Things Security Analysis," 2011 International Conference on Internet Technology and Applications (iTAP), 2011, pp. 1-4.
  3. M. Palattella, N. Accettura, X. Vilajosana, T. Watteyne, L. Grieco, G. Boggia, and M. Dohler, "Standardized protocol stack for the internet of (important) things," Proceedings of IEEE, 2012, pp. 1-18.
  4. O. Vermesan, P. Friess,and A. Furness, The Internet of Things 2012, By New Horizons, 2012. [Online]. Available: http://www. internet-of-things-research. eu/pdf/ IERC_Cluster_ Book_2012_WEB. pdf
  5. W. Zhao, C. Wang, and Y. Nakahira, "Medical Application On IoT," International Conference on Computer Theory and Applications (ICCTA), 2011, pp. 660-665.
  6. K. Bing, L. Fu, Y. Zhuo, and L. Yanlei, "Design of an Internet of Things-based Smart Home System," 2nd International Conference on Intelligent Control and Information Processing, 2011, pp. 921-924.
  7. J. Liu, and L. Yang, "Application of Internet of Things in the Community Security Management," Computational Intelligence, Communication Systems and Networks,Third International Conference on IEEE, 2011, pp. 314-318.
  8. D. Jiang, and C. ShiWei, "A Study of Information Security for M2M of IoT," 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), 2010, pp. 576-579.
  9. RFC 2828, "Internet Security Glossary," May 2000, [Online]. Available: https://www. ietf. org/rfc/rfc2828. txt.
  10. Y. Cheng, M. Naslund, G. Selander, and E. Fogelström, "Privacy in Machine-to-Machine Communications: A state-of-the-art survey," International Conference onCommunication Systems (ICCS),Proceedings of IEEE, 2012, pp. 75-79.
  11. L. Zhou, Q. Wen, and H. Zhang. "Preserving Sensor Location Privacy in Internet of Things. " In Computational and Information Sciences (ICCIS), proceedings of IEEE, 2012, pp. 856-859.
  12. B. Tepekule, U. Yavuz, and A. E. Pusane, "Modern Kodlama Tekniklerinin QR Kod Uygulamalar?na Yatk?nl?g, " On the Use of Modern Coding Techniques in QR Applications. ", Proceedings of IEEE, 2013. pp. 1-4.
  13. M. Giannikos, K. Korina, N. Fotiou, G. F. Marias and G. C. Polyzos, "Towards secure and context-aware information lookup for the Internet of Things. " In Computing, Networking and Communications (ICNC,) Proceedings of IEEE , 2013, pp. 632-636.
  14. R. Hall, A. Rinaldo, and L. Wasserman, "Differential Privacy for Functions and Functional Data," Journal of Machine Learning Research, 2013, pp. 703-727.
  15. E. Liu, Z. Liu, and F. Shao, "Digital Rights Management and Access Control in Multimedia Social Networks" In Genetic and Evolutionary Computing, Springer International Publishing, 2014,pp. 257-266.
Index Terms

Computer Science
Information Sciences


Internet of Things (IoT) Threats Security Privacy .