ABSTRACT
The Internet of things (IoT) refers to every object, which is connected over a network with the ability to transfer data. Users perceive this interaction and connection as useful in their daily life. However any improperly designed and configured technology will exposed to security threats. Therefore an ecosystem for IoT should be designed with security embedded in each layer of its ecosystem. This paper will discussed the security threats to IoT and then proposed an IoT Security Framework to mitigate it. Then IoT Security Framework will be used to develop a Secure IoT Sensor to Cloud Ecosystem.
- Anderson, C. R. 2014. The internet of Things: The possibilities are endless, but how will we get there?. IDC APeJ Internet of Things Web Conference on 19 June 2014.Google Scholar
- Prentice, S. 2014. "The Five SMART Technologies to Watch", GartnerGoogle Scholar
- Higginbotham, S. 2011. Ericsson CEO Predicts 50 Billion Internet Connected Devices by 2020. Ericsson. DOI at: http://gigaom.com/2010/04/14/ericsson-sees-the-internet-of-things-by-2020/Google Scholar
- Davies, J. 2014. "Internet of Things crisis? Privacy issues could be barrier to smart-device take-up, says Ipsos Mori report".Google Scholar
- Tarkoma, S., Katasonov, A.: Internet of Things Strategic Research Agenda. Finnish Strategic Centre for Science, Technology and Innovation. 2011.Google Scholar
- Farhana T. and H. Islam. 2009. Wearable Wireless Body Area Networks. Proceedings of the Information Management and Engineering, (ICIME '09). Google ScholarDigital Library
- Hewlett Packard (HP), Internet of Things Research Study. 2015. DOI: http://www8.hp.com/h20195/V2/GetPDF.aspx/4AA5-4759ENW.pdfGoogle Scholar
- Rahman A.F.A and Mohamad M. Z. 2015. Developing the Security Zone for Wireless Body Area Network (WBAN) Implementation Using Practical Security Assessment (PSA). Journal of Advance Computer and Network (JACN).Google ScholarCross Ref
- Open Web Application Security Project (OWASP) IoT Top Ten Vulnerabilities. 2014. DOI https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdfGoogle Scholar
- Kumar J. S. and Patel D. R. 2014. A Survey on Internet of Things: Security and Privacy Issues. International Journal of Computer Applications. Vol. 90. No. 11.Google Scholar
- Dong H.K. Ji Y. C., Sungjun K. and Jongin L. 2015. A study of Developing Security Requirements for Internet of Things. Advances Science and Technology Letters. Vol 87.Google Scholar
- Jung T. K. 2013. Analyses of Integrated Security Framework with Embedded RFID System for Wireless Network Architecture. Journal of Convergence Information Technology Vol 8. No. 14 2013.Google Scholar
- Securing Sensor to Cloud Ecosystem using Internet of Things (IoT) Security Framework
Recommendations
A Review on Privacy Requirements and Application Layer Security in Internet of Things (IoT)
AbstractInternet of Things (IoT) is the predominant emerging technology that targets on facilitating interconnection of internet-enabled resources. IoT applications concentrate on automating different tasks that facilitate physical objects to act ...
A Review on Privacy Requirements and Application Layer Security in Internet of Things (IoT)
AbstractInternet of Things (IoT) is the predominant emerging technology that targets on facilitating interconnection of internet-enabled resources. IoT applications concentrate on automating different tasks that facilitate physical objects to act ...
Internet of Things (IoT): From awareness to continued use
AbstractThis paper proposes a research model with five constructs, i.e., IoT awareness, users’ IoT privacy knowledge, users’ IoT security knowledge, users’ IoT Trust, and continued intention to use IoT to bring clarity to the growing yet ...
Highlights- Clarifying how variables linked from IoT awareness to IoT continued use.
- IoT ...
Comments