Applications and Security Aspects of Internet of Things for Way of Smart World

Muhammad Fawaz M.*
Department of Vocational Education (Software Development), Indira Gandhi National Tribal University, Amarkantak, Madhya Pradesh, India.
Periodicity:July - December'2022
DOI : https://doi.org/10.26634/jes.11.1.19136

Abstract

The Internet of Things (IoT) is the interconnection of computing devices embedded in everyday objects, enabling them to send and receive data over the Internet. IoT is an advanced, futuristic, and disruptive technology. IoT describes a network of physical objects or "things" that are embedded with sensors, software, and other technologies to connect and exchange data with other devices and systems over the Internet. It reduces computation costs through improved process efficiency, asset utilization, and productivity for any organization. The growth and convergence of data, processes, and things on the Internet would make such connections more relevant and important, creating more opportunities for people, businesses, and industries. This article only deals with the security of the IoT and some smart applications. Nowadays many of the devices are linked to smart technologies like IoT or AI. The two closest examples of IoT are the watch in our hand and the mobile phone. One of the goals of smart environments is to improve the quality of human life in terms of comfort and efficiency. The IoT paradigm has already evolved into a technology for building smart environments. Security and privacy are considered as key issues in any real-world smart environment aging based on the IoT model. Security vulnerabilities in IoT-based systems create security threats that affect smart environment applications.

Keywords

Environment, Security, Applications, Big Data.

How to Cite this Article?

Fawaz, M. M. (2022). Applications and Security Aspects of Internet of Things for Way of Smart World. i-manager’s Journal on Embedded Systems, 11(1), 33-41. https://doi.org/10.26634/jes.11.1.19136

References

[1]. Ahmed, E., Yaqoob, I., Gani, A., Imran, M., & Guizani, M. (2016). Internet-of-things-based smart environments: state of the art, taxonomy, and open research challenges. IEEE Wireless Communications, 23(5), 10-16. https://doi.org/10.1109/MWC.2016.7721736
[2]. Akhtar, F., Rehmani, M. H., & Reisslein, M. (2016). White space: Definitional perspectives and their role in exploiting spectrum opportunities. Telecommunications Policy, 40(4), 319-331. https://doi.org/10.1016/j.telpol.2016.01.003
[3]. Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer Networks, 54(15), 2787-2805. https://doi.org/10.1016/j.comnet.2010.05.010
[4]. Citron, R., Maxwell, K., & Woods, E. (2017). Smart City Services Market. Technical report, Navigant Research.
[5]. Colom, J. F., Gil, D., Mora, H., Volckaert, B., & Jimeno, A. M. (2018). Scheduling framework for distributed intrusion detection systems over heterogeneous network architectures. Journal of Network and Computer Applications, 108, 76-86. https://doi.org/10.1016/j.jnca.2018.02.004
[6]. Gillis A. S. (n.d.). What is the Internet of Things (Iot)? Retrieved from http://internetofthingsagenda.techtarget.com/definition/Internet-of-Things-IoT
[7]. Giusto, D., Iera, A., Morabito, G., & Atzori, L. (Eds.). (2010). The Internet of Things: 20th Tyrrhenian Workshop on Digital Communications. Springer Science & Business Media.
[8]. Guo, J., Chen, R., & Tsai, J. J. (2017). A survey of trust computation models for service management in internet of things systems. Computer Communications, 97, 1-14. https://doi.org/10.1016/j.comcom.2016.10.012
[9]. Heater, B. (2016). Lenovo Shows Off a Pair of Intel- Powered Smart Shoes, Retrieved from https://techcrunch.com/2016/06/09/lenovo-smart-shoes/
[10]. Jain, R. (2018). A congestion control system based on VANET for small length roads. Annals of Emerging Technologies in Computing (AETiC), 2(1), 17–21. https://doi.org/10.33166/AETiC.2018.01.003
[11]. Khan, A. A., Rehmani, M. H., & Rachedi, A. (2017a). Cognitive-radio-based internet of things: Applications, architectures, spectrum related functionalities, and future research directions. IEEE Wireless Communications, 24(3), 17-25. https://doi.org/10.1109/MWC.2017.1600404
[12]. Khan, S., Parkinson, S., & Qin, Y. (2017b). Fog computing security: a review of current applications and security solutions. Journal of Cloud Computing, 6(1), 1-22. https://doi.org/10.1186/s13677-017-0090-3
[13]. Mahmud, S. H., Assan, L., & Islam, R. (2018). Potentials of internet of things (IoT) in Malaysian construction industry. Annals of Emerging Technologies in Computing (AETiC), 2(1), 44-52. https://doi.org/10.33166/AETiC.2018.04.004
[14]. Miraz, M. H., Ali, M., Excell, P. S., & Picking, R. (2018). Internet of nano-things, things and everything: future growth trends. Future Internet, 10(8), 68. https://doi.org/10.3390/fi10080068
[15]. Mollah, M. B., Azad, M. A. K., & Vasilakos, A. (2017). Security and privacy challenges in mobile cloud computing: Survey and way ahead. Journal of Network and Computer Applications, 84, 38-54. https://doi.org/10.1016/j.jnca.2017.02.001
[16]. Patel, K. K., Patel, S. M., & Scholar, P. (2016). Internet of things-IOT: definition, characteristics, architecture, enabling technologies, application & future challenges. International Journal of Engineering Science and Computing, 6(5), 6122–6131.
[17]. Sani, A. S., Yuan, D., Jin, J., Gao, L., Yu, S., & Dong, Z. Y. (2019). Cyber security framework for internet of thingsbased energy internet. Future Generation Computer Systems, 93, 849-859. https://doi.org/10.1016/j.future.2018.01.029
[18]. Sanz, R. M. G. (2018). Your Guide to the GDPR. Retrieved from https://spectrum.ieee.org/your-guide-tothe-gdpr
[19]. Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks, 76, 146-164. https://doi.org/10.1016/j.comnet.2014.11.008
[20]. Soomro, S., Miraz, M. H., Prasanth, A., & Abdullah, M. (2018). Artificial intelligence enabled IoT: traffic congestion reduction in smart cities. IET 2018 Smart Cities Symposium, 81–86. https://doi.org/10.1049/cp.2018.1381
[21]. Stergiou, C., Psannis, K. E., Kim, B. G., & Gupta, B. (2018). Secure integration of IoT and cloud computing. Future Generation Computer Systems, 78, 964-975. https://doi.org/10.1016/j.future.2016.11.031
[22]. Veena, S., Mahesh, K., Rajesh, M., & Salmon, S. (2018). The survey on smart agriculture using IOT. International Journal of Innovative Research in Engineering & Management (IJIREM), 5(2), 63-66.
[23]. Wachter, S. (2018a). GDPR and the Internet of Things: Guidelines to Protect Users' Identity and Privacy. Oxford Internet Institute, United Kingdom, (pp. 25).
[24]. Wachter, S. (2018b). Normative challenges of identification in the internet of things: Privacy, profiling, discrimination, and the GDPR. Computer Law & Security Review, 34(3), 436-449. https://doi.org/10.1016/j.clsr.2018.02.002
[25]. Zanjal, S. V., & Talmale, G. R. (2016). Medicine reminder and monitoring system for secure health using IOT. Procedia Computer Science, 78, 471-476. https://doi.org/10.1016/j.procs.2016.02.090
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.