A Review on Internet of Things (IoT): Security and Privacy Requirements and the Solution Approaches
A Review on Internet of Things (IoT): Security and Privacy Requirements and the Solution Approaches
Article PDF

Keywords

internet of things (IOT)
security
privacy issues
wireless sensor networks
RFID
authentication
key management

How to Cite

Muhammad A Iqbal. (2017). A Review on Internet of Things (IoT): Security and Privacy Requirements and the Solution Approaches. Global Journal of Computer Science and Technology, 16(E7), 1–9. Retrieved from https://gjcst.com/index.php/gjcst/article/view/829

Abstract

The world is undergoing a dramatic rapid transformation from isolated systems to ubiquitous Internet-based-enabled things capable of interacting each other and generating data that can be analyzed to extract valuable information This highly interconnected global network structure known as Internet of Things will enrich everyone s life increase business productivity improve government efficiency and the list just goes on However this new reality IoT built on the basis of Internet contains new kind of challenges from a security and privacy perspective Traditional security primitives cannot be directly applied to IoT technologies due to the different standards and communication stacks involved Along with scalability and heterogeneity issues major part of IoT infrastructure consists of resource constrained devices such as RFIDs and wireless sensor nodes Therefore a flexible infrastructure is required capable to deal with security and privacy issues in such a dynamic environment This paper presents an overview of IoT security and privacy challenges and the existing security solutions and identifying some open issues for future research
Article PDF
Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright (c) 2016 Authors and Global Journals Private Limited