International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 182 - Issue 36 |
Published: Jan 2019 |
Authors: Abdullah Mohammed Alsaedi |
![]() |
Abdullah Mohammed Alsaedi . A Comparative Study on Models and Techniques for Securing IoT Applications. International Journal of Computer Applications. 182, 36 (Jan 2019), 21-25. DOI=10.5120/ijca2019918362
@article{ 10.5120/ijca2019918362, author = { Abdullah Mohammed Alsaedi }, title = { A Comparative Study on Models and Techniques for Securing IoT Applications }, journal = { International Journal of Computer Applications }, year = { 2019 }, volume = { 182 }, number = { 36 }, pages = { 21-25 }, doi = { 10.5120/ijca2019918362 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2019 %A Abdullah Mohammed Alsaedi %T A Comparative Study on Models and Techniques for Securing IoT Applications%T %J International Journal of Computer Applications %V 182 %N 36 %P 21-25 %R 10.5120/ijca2019918362 %I Foundation of Computer Science (FCS), NY, USA
With digitization continuing to enter all aspects of daily life, a growing number of devices and appliances are becoming ‘smart’ and digitally connected. As a result, a large range of IoT applications have been developed and released utilizing a variety of IoT frameworks. All frameworks of IoT environments are composed of a set of procedurals, rules and standards that allow easy implementation and deployment of the various IoT applications. Deploying and implementing these applications necessitates a range of mechanisms and procedurals of security and privacy to ensure proper working and avoid any threats that may occur. This paper introduces a survey of how to secure IoT frameworks through applying a comparative study on a set of basic security mechanisms applied by providing background about security mechanisms, in addition to advantages and disadvantages of each security technique in IoT applications domain.