Architectural Layers of Internet of Things and Issues at Different Layers
J. Kaur1 , J. Sengupta2
Section:Survey Paper, Product Type: Journal Paper
Volume-7 ,
Issue-5 , Page no. 1690-1694, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.16901694
Online published on May 31, 2019
Copyright © J. Kaur, J. Sengupta . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: J. Kaur, J. Sengupta, “Architectural Layers of Internet of Things and Issues at Different Layers,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1690-1694, 2019.
MLA Style Citation: J. Kaur, J. Sengupta "Architectural Layers of Internet of Things and Issues at Different Layers." International Journal of Computer Sciences and Engineering 7.5 (2019): 1690-1694.
APA Style Citation: J. Kaur, J. Sengupta, (2019). Architectural Layers of Internet of Things and Issues at Different Layers. International Journal of Computer Sciences and Engineering, 7(5), 1690-1694.
BibTex Style Citation:
@article{Kaur_2019,
author = {J. Kaur, J. Sengupta},
title = {Architectural Layers of Internet of Things and Issues at Different Layers},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {7},
Issue = {5},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {1690-1694},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4472},
doi = {https://doi.org/10.26438/ijcse/v7i5.16901694}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i5.16901694}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4472
TI - Architectural Layers of Internet of Things and Issues at Different Layers
T2 - International Journal of Computer Sciences and Engineering
AU - J. Kaur, J. Sengupta
PY - 2019
DA - 2019/05/31
PB - IJCSE, Indore, INDIA
SP - 1690-1694
IS - 5
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
363 | 223 downloads | 167 downloads |
Abstract
IoT is composed of tiny objects implanted with sensors, actuators and Radio Frequency Identification (RFID) tags which make the best use of the network to offer an extensive choice of applications. The major cause for the rapid expansion of IoT is the economic range of intelligent objects and easy availability of internet services. The sensitive information is accessible over network and thus creating threat to data and information. The information privacy is a critical factor in the growth of IoT. In this paper, we review the basics of privacy in IoT, various issues related to privacy and the technologies which can aid in maintain the security of personal data.
Key-Words / Index Term
Privacy , Internet of Things, Identification, Privacy-Preserving Mechanism
References
[1]A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, “Internet of things: A survey on enabling technologies, protocols, and applications”. IEEE Communications Surveys Tutorials, 17(4):2347–2376, Fourth quarter 2015.
[2] I. Andrea, C. Chrysostomou, and G. Hadjichristofi, “Internet of things: Security vulnerabilities and challenges”. In Proc. of 2015 IEEE Symposium on Computers and Communication (ISCC), July 2015.
[3]L. Atzori, A. Iera, and G. Morabito, “The internet of things: A survey”In Computer Networks, 54(15):2787–2805, October 2010.
[4]M.V. Bharathi, R. C. Tanguturi, C. Jayakumar, and K. Selvamani., “Node capture attack in wireless sensor network: A survey”. In Proc. of 2012 IEEE International Conference on Computational Intelligence
Computing Research (ICCIC), December 2012.
[5]F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog computing and its role in the internet of things”, In Proc. of the First Edition of the MCC Workshop on Mobile Cloud Computing, August 2012.
[6] C. Bormann, A. P. Castellani, and Z. Shelby, “Coap: An application protocol for billions of tiny internet nodes”. IEEE Internet Computing, 16(2):62–67, March 2012.
[7] G. Gan, Z. Lu, and J. Jiang, “Internet of things security analysis”, In Proc. of 2011 International Conference on Internet Technology and Applications (iTAP), August 2011.
[8] M. Leo, F. Battisti, M. Carli, and A. Neri, “A federated architecture approach for internet of things security”, In Proc. of 2014 Euro Med Telco Conference (EMTC), November 2014.
[9] Y. Liu and G. Zhou, “Key technologies and applications of internet of things”, In Proc. of 2012 Fifth International Conference on Intelligent Computation Technology and Automation (ICICTA), January 2012.
[10] P. Lpez, D. Fernndez, A. J. Jara, and A. F. Skarmeta, “Survey of internet of things technologies for clinical environments”, In Proc. of 2013 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA), March 2013.
[11] R. Mahmoud, T. Yousuf, F. Aloul, and I. Zualkernan, “Internet of things (iot) security: Current status, challenges and prospective measures”, In Proc. of 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), December 2015.
[12] D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac, “Internet of things”, in Ad Hoc Networks, 10(7):1497–1516, September 2012.
[13] M. H. Miraz, M. Ali, P. S. Excell, and R. Picking, “A review on internet of things (iot), internet of everything (ioe) and internet of nano things (iont)” In Proc. of 2015 Internet Technologies and Applications (ITA),September 2015.
[14] K. P. N. Puttaswamy, R. Bhagwan, and V. N. Padmanabhan, “Anonygator: Privacy and integrity preserving data aggregation”, In Proc. of the ACM/IFIP/USENIX 11th International Conference on Middleware, Middleware ’10, Berlin, Heidelberg, December 2010, Springer-Verlag.
[15] F. Qiu, F. Wu, and G. Chen, “Privacy and quality preserving multimedia data aggregation for participatory sensing systems” in IEEE Transactions on Mobile Computing, 14(6):1287–1300, June 2015.
[16] X. Ren, X. Yang, J. Lin, Q. Yang, and W. Yu, “On scaling perturbation based privacy-preserving schemes in smart metering systems”, In Proc. of 2013 22nd International Conference on Computer Communication and Networks (ICCCN), July 2013.
[17] J. A. Stankovic, “Research directions for the internet of things”. IEEE Internet of Things Journal, 1(1):3–9, February 2014
[18] K. Zhao and L. Ge., “A survey on the internet of things security”, In Proc. of 2013 9th International Conference on Computational Intelligence and Security (CIS), December 2013.
[19] G.D’Acquisto, J.Domingo-Ferrer, P. Kikiras, V. Torra, Y.-A. De Montjoye, and A. Bourka, “Privacy by design in big data: An overview of privacy enhancing technologies in the era of big data analytics,” arXiv preprint arXiv: 1512.06000, 2015
[20] M. Langheinrich, “Privacy by design principles of privacy-aware ubiquitous systems,” in Ubicomp 2001: Ubiquitous Computing., pp. 273–291. Springer, 2001
[21] S. Spiekermann and L. F. Cranor, “Engineering privacy,” IEEE Transactions on software engineering, vol. 35, no. 1, pp. 67–82, 2009.
[22] S. Lahlou, M. Langheinrich, and C. R¨ocker,“Privacy and trust issues with invisible computers,” Communications of the ACM, vol. 48, no. 3, pp. 59–60, 2005.
[23] V. Tiwari, P. Adkar, “Implementation of IoT in Home Automation using Andriod Application”, International Journal of Scientific Research in Computer Science and Engineering, Vol. 7, Issue 2, pp. 11-16, April 2019.
[24] P. Bhatt, B. Thaker, N. Shah, “A Survey on Developing Secure IoT Products”, International Journal of Scientific Research in Computer Science and Engineering, Vol. 6, Issue 5, pp. 41-44, October 2018.
[25] G. Kaur, M.Sohal, “IOT Survey: The Phase Changer in Healthcare Industry”, International Journal of Scientific Research in Network Security and Communication, Volume-6, Issue-2, pp. April 2018.
[26] R. Maruthaveni, V. Kathiresan,“A Critical Study on RFID” International Journal of Scientific Research in Network Security and Communication, Volume-6, Issue-2, pp.62-65, April 2018.