Research Article

A Survey on Internet of Things: Security and Privacy Issues

by  J. Sathish Kumar, Dhiren R. Patel
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 90 - Issue 11
Published: March 2014
Authors: J. Sathish Kumar, Dhiren R. Patel
10.5120/15764-4454
PDF

J. Sathish Kumar, Dhiren R. Patel . A Survey on Internet of Things: Security and Privacy Issues. International Journal of Computer Applications. 90, 11 (March 2014), 20-26. DOI=10.5120/15764-4454

                        @article{ 10.5120/15764-4454,
                        author  = { J. Sathish Kumar,Dhiren R. Patel },
                        title   = { A Survey on Internet of Things: Security and Privacy Issues },
                        journal = { International Journal of Computer Applications },
                        year    = { 2014 },
                        volume  = { 90 },
                        number  = { 11 },
                        pages   = { 20-26 },
                        doi     = { 10.5120/15764-4454 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2014
                        %A J. Sathish Kumar
                        %A Dhiren R. Patel
                        %T A Survey on Internet of Things: Security and Privacy Issues%T 
                        %J International Journal of Computer Applications
                        %V 90
                        %N 11
                        %P 20-26
                        %R 10.5120/15764-4454
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper introduces Internet of Things (IoTs), which offers capabilities to identify and connect worldwide physical objects into a unified system. As a part of IoTs, serious concerns are raised over access of personal information pertaining to device and individual privacy. This survey summarizes the security threats and privacy concerns of IoT. .

References
  • C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos, "Context Aware Computing for The Internet of Things: A Survey" IEEE Communications Surveys & Tutorials, 2013, pp. 1-41
  • G. Gang, L. Zeyong, and J. Jun, "Internet of Things Security Analysis," 2011 International Conference on Internet Technology and Applications (iTAP), 2011, pp. 1-4.
  • M. Palattella, N. Accettura, X. Vilajosana, T. Watteyne, L. Grieco, G. Boggia, and M. Dohler, "Standardized protocol stack for the internet of (important) things," Proceedings of IEEE, 2012, pp. 1-18.
  • O. Vermesan, P. Friess,and A. Furness, The Internet of Things 2012, By New Horizons, 2012. [Online]. Available: http://www. internet-of-things-research. eu/pdf/ IERC_Cluster_ Book_2012_WEB. pdf
  • W. Zhao, C. Wang, and Y. Nakahira, "Medical Application On IoT," International Conference on Computer Theory and Applications (ICCTA), 2011, pp. 660-665.
  • K. Bing, L. Fu, Y. Zhuo, and L. Yanlei, "Design of an Internet of Things-based Smart Home System," 2nd International Conference on Intelligent Control and Information Processing, 2011, pp. 921-924.
  • J. Liu, and L. Yang, "Application of Internet of Things in the Community Security Management," Computational Intelligence, Communication Systems and Networks,Third International Conference on IEEE, 2011, pp. 314-318.
  • D. Jiang, and C. ShiWei, "A Study of Information Security for M2M of IoT," 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), 2010, pp. 576-579.
  • RFC 2828, "Internet Security Glossary," May 2000, [Online]. Available: https://www. ietf. org/rfc/rfc2828. txt.
  • Y. Cheng, M. Naslund, G. Selander, and E. Fogelström, "Privacy in Machine-to-Machine Communications: A state-of-the-art survey," International Conference onCommunication Systems (ICCS),Proceedings of IEEE, 2012, pp. 75-79.
  • L. Zhou, Q. Wen, and H. Zhang. "Preserving Sensor Location Privacy in Internet of Things. " In Computational and Information Sciences (ICCIS), proceedings of IEEE, 2012, pp. 856-859.
  • B. Tepekule, U. Yavuz, and A. E. Pusane, "Modern Kodlama Tekniklerinin QR Kod Uygulamalar?na Yatk?nl?g, " On the Use of Modern Coding Techniques in QR Applications. ", Proceedings of IEEE, 2013. pp. 1-4.
  • M. Giannikos, K. Korina, N. Fotiou, G. F. Marias and G. C. Polyzos, "Towards secure and context-aware information lookup for the Internet of Things. " In Computing, Networking and Communications (ICNC,) Proceedings of IEEE , 2013, pp. 632-636.
  • R. Hall, A. Rinaldo, and L. Wasserman, "Differential Privacy for Functions and Functional Data," Journal of Machine Learning Research, 2013, pp. 703-727.
  • E. Liu, Z. Liu, and F. Shao, "Digital Rights Management and Access Control in Multimedia Social Networks" In Genetic and Evolutionary Computing, Springer International Publishing, 2014,pp. 257-266.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Internet of Things (IoT) Threats Security Privacy .

Powered by PhDFocusTM