|
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
| Volume 182 - Issue 36 |
| Published: Jan 2019 |
| Authors: Abdullah Mohammed Alsaedi |
10.5120/ijca2019918362
|
Abdullah Mohammed Alsaedi . A Comparative Study on Models and Techniques for Securing IoT Applications. International Journal of Computer Applications. 182, 36 (Jan 2019), 21-25. DOI=10.5120/ijca2019918362
@article{ 10.5120/ijca2019918362,
author = { Abdullah Mohammed Alsaedi },
title = { A Comparative Study on Models and Techniques for Securing IoT Applications },
journal = { International Journal of Computer Applications },
year = { 2019 },
volume = { 182 },
number = { 36 },
pages = { 21-25 },
doi = { 10.5120/ijca2019918362 },
publisher = { Foundation of Computer Science (FCS), NY, USA }
}
%0 Journal Article
%D 2019
%A Abdullah Mohammed Alsaedi
%T A Comparative Study on Models and Techniques for Securing IoT Applications%T
%J International Journal of Computer Applications
%V 182
%N 36
%P 21-25
%R 10.5120/ijca2019918362
%I Foundation of Computer Science (FCS), NY, USA
With digitization continuing to enter all aspects of daily life, a growing number of devices and appliances are becoming ‘smart’ and digitally connected. As a result, a large range of IoT applications have been developed and released utilizing a variety of IoT frameworks. All frameworks of IoT environments are composed of a set of procedurals, rules and standards that allow easy implementation and deployment of the various IoT applications. Deploying and implementing these applications necessitates a range of mechanisms and procedurals of security and privacy to ensure proper working and avoid any threats that may occur. This paper introduces a survey of how to secure IoT frameworks through applying a comparative study on a set of basic security mechanisms applied by providing background about security mechanisms, in addition to advantages and disadvantages of each security technique in IoT applications domain.