Successive Security Challenges Implementation on Internet of Things


Article PDF :

Veiw Full Text PDF

Article type :

Original Article

Author :

M. Ann Bency

Volume :

2

Issue :

2

Abstract :

This Paper demonstrates commonly used communication scheme and information retrieval which are carried out via Internet using numerous types of smart devices, can turn the Internet into a very dangerous platform because of its built-in nature of making its users' identity easily traceable and discusses some countermeasures that can be used to prevent existing and projected security breaches. It initially provides some introductory information on technology advancement, penetration of the Internet to all aspects of our life and its associated conveniences. It then discusses vulnerability of internet services, presents some typical attack cases that are carried out via smart home appliances, and explains security implementation challenges on such devices from technical, social, and practical aspects. Finally, it proposes an appropriate security model, demonstrates relevant counter measures for numerous attack scenarios, and explains why and how numerous stake holders are needed to get together for its commercial implementation. by M. Ann Bency"Successive Security Challenges Implementation on Internet of Things" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018, URL: http://www.ijtsrd.com/papers/ijtsrd8342.pdf Paper URL: http://www.ijtsrd.com/engineering/computer-engineering/8342/successive-security-challenges-implementation-on-internet-of-things/m-ann-bency

Keyword :

Internet of Things, IoT, Smart, Social Cybernetics, Social Networking, Facebook, Online Advertising, Security, Privacy, Network Tracing Tools
Journals Insights Open Access Journal Filmy Knowledge Hanuman Devotee Avtarit Wiki In Hindi Multiple Choice GK