CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Survey on Internet of Things: Security and Privacy Issues

by J. Sathish Kumar, Dhiren R. Patel
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 90 - Number 11
Year of Publication: 2014
Authors: J. Sathish Kumar, Dhiren R. Patel
10.5120/15764-4454

J. Sathish Kumar, Dhiren R. Patel . A Survey on Internet of Things: Security and Privacy Issues. International Journal of Computer Applications. 90, 11 ( March 2014), 20-26. DOI=10.5120/15764-4454

@article{ 10.5120/15764-4454,
author = { J. Sathish Kumar, Dhiren R. Patel },
title = { A Survey on Internet of Things: Security and Privacy Issues },
journal = { International Journal of Computer Applications },
issue_date = { March 2014 },
volume = { 90 },
number = { 11 },
month = { March },
year = { 2014 },
issn = { 0975-8887 },
pages = { 20-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume90/number11/15764-4454/ },
doi = { 10.5120/15764-4454 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:10:46.177312+05:30
%A J. Sathish Kumar
%A Dhiren R. Patel
%T A Survey on Internet of Things: Security and Privacy Issues
%J International Journal of Computer Applications
%@ 0975-8887
%V 90
%N 11
%P 20-26
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper introduces Internet of Things (IoTs), which offers capabilities to identify and connect worldwide physical objects into a unified system. As a part of IoTs, serious concerns are raised over access of personal information pertaining to device and individual privacy. This survey summarizes the security threats and privacy concerns of IoT. .

References
  1. C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos, "Context Aware Computing for The Internet of Things: A Survey" IEEE Communications Surveys & Tutorials, 2013, pp. 1-41
  2. G. Gang, L. Zeyong, and J. Jun, "Internet of Things Security Analysis," 2011 International Conference on Internet Technology and Applications (iTAP), 2011, pp. 1-4.
  3. M. Palattella, N. Accettura, X. Vilajosana, T. Watteyne, L. Grieco, G. Boggia, and M. Dohler, "Standardized protocol stack for the internet of (important) things," Proceedings of IEEE, 2012, pp. 1-18.
  4. O. Vermesan, P. Friess,and A. Furness, The Internet of Things 2012, By New Horizons, 2012. [Online]. Available: http://www. internet-of-things-research. eu/pdf/ IERC_Cluster_ Book_2012_WEB. pdf
  5. W. Zhao, C. Wang, and Y. Nakahira, "Medical Application On IoT," International Conference on Computer Theory and Applications (ICCTA), 2011, pp. 660-665.
  6. K. Bing, L. Fu, Y. Zhuo, and L. Yanlei, "Design of an Internet of Things-based Smart Home System," 2nd International Conference on Intelligent Control and Information Processing, 2011, pp. 921-924.
  7. J. Liu, and L. Yang, "Application of Internet of Things in the Community Security Management," Computational Intelligence, Communication Systems and Networks,Third International Conference on IEEE, 2011, pp. 314-318.
  8. D. Jiang, and C. ShiWei, "A Study of Information Security for M2M of IoT," 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), 2010, pp. 576-579.
  9. RFC 2828, "Internet Security Glossary," May 2000, [Online]. Available: https://www. ietf. org/rfc/rfc2828. txt.
  10. Y. Cheng, M. Naslund, G. Selander, and E. Fogelström, "Privacy in Machine-to-Machine Communications: A state-of-the-art survey," International Conference onCommunication Systems (ICCS),Proceedings of IEEE, 2012, pp. 75-79.
  11. L. Zhou, Q. Wen, and H. Zhang. "Preserving Sensor Location Privacy in Internet of Things. " In Computational and Information Sciences (ICCIS), proceedings of IEEE, 2012, pp. 856-859.
  12. B. Tepekule, U. Yavuz, and A. E. Pusane, "Modern Kodlama Tekniklerinin QR Kod Uygulamalar?na Yatk?nl?g, " On the Use of Modern Coding Techniques in QR Applications. ", Proceedings of IEEE, 2013. pp. 1-4.
  13. M. Giannikos, K. Korina, N. Fotiou, G. F. Marias and G. C. Polyzos, "Towards secure and context-aware information lookup for the Internet of Things. " In Computing, Networking and Communications (ICNC,) Proceedings of IEEE , 2013, pp. 632-636.
  14. R. Hall, A. Rinaldo, and L. Wasserman, "Differential Privacy for Functions and Functional Data," Journal of Machine Learning Research, 2013, pp. 703-727.
  15. E. Liu, Z. Liu, and F. Shao, "Digital Rights Management and Access Control in Multimedia Social Networks" In Genetic and Evolutionary Computing, Springer International Publishing, 2014,pp. 257-266.
Index Terms

Computer Science
Information Sciences

Keywords

Internet of Things (IoT) Threats Security Privacy .