The Effects of Iot- New Features on Security and Privacy

Authors

  • Amrita Student, Trinity Institute Of Professional Studies, Dwarka
  • Neha Aggarwal Assistant Professor, Trinity Institute Of Professional Studies, Dwarka
  • Sourav Student, Trinity Institute Of Professional Studies, Dwarka

DOI:

https://doi.org/10.48165/acspublisher.tjmitm.2022.14

Keywords:

Internet of things (IOT), IOT features, privacy and security

Abstract

IoT technology is drawing a very important communication line between  individuals. It’s providing how of effective communication. Additionally to the  current, it’s conjointly creating people’s life higher by providing how for good  home systems, good agriculture systems and even additional good systems that  folks want. The maximum amount as this technology is sweet as attackers attempt  to exploit it during a unhealthy thanks to attack the IoT systems and build edges  of innocent sensitive knowledge and data. This makes it necessary to develop ways  and techniques that might defend IoT systems. That successively defend people’s  sensitive info. Security and privacy of IoT systems became a challenge and a very  important a part of IoT systems. Security and privacy problems take issue in their  danger level. Some attacks are additional dangerous than different attacks. Also,  attacks take issue in their supply some attacks are internal and different attacks are  external. Attacks may be completely different however their negative have an effect  on is that the same and vary within the dangerous level. This paper explains about  the privacy and security, threats, attack etc. 

References

Ruchi Parashar, Abid Khan, Neha, “A SURVEY:THE INTERNET OF THINGS,” InternationalJournal of Technical Research and Applications e-ISSN: 2320-8163, Volume 4, Issue 3 (May-June,2016).

M. Almulhim, and N. Zaman, “Proposing secure and lightweight authentication scheme for IoT based E-health applications”, 2018 20th International Conference on Advanced Communication Technology (ICACT), 481-487

Almulhim, and N. Zaman, “Proposing secure and lightweight authentication scheme for IoT based E-health applications”, 2018 20th International Conference on Advanced Communication Technology (ICACT), 481-487.

M. Almulhim, N. Islam and N. Zaman, “A Lightweight and Secure Authentication Scheme for IoT Based E-Health Applications”, International Journal of Computer Science and Network Security 19 (1), 107-120.

K. Hussain, S.J. Hussain, NZ. Jhanjhi and M. Humayun, “SYN Flood Attack Detection based on Bayes Estimator (SFADBE) For MANET”, International Conference on Computer and Information Sciences (ICCIS), 1-4, 2019.

K Hussain, NZ Jhanjhi, H Mati-ur-Rahman, J Hussain, MH Islam, Using a systematic framework to critically analyze proposed smart card based two factor authentication schemes, Journal of King Saud University- Computer and Information Sciences

S. Jawad Hussain, Usman Ahmed, H. Waqas, S. Mir, NZ. Jhanjhi, and M. Humayun, “IMIAD: Intelligent Malware Identification for Android Platform,” IEEE 2019 International Conference on Computer and Information Sciences (ICCIS), Al Jouf, Saudi Arabia, 2019

Humayun, M., Niazi, M., Jhanjhi, N. et al. Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study. Arab J Sci Eng (2020). https://doi.org/10.1007/s13369- 019-04319-2

Khan, Azeem, N. Z. Jhanjhi, Mamoona Humayun and Muneer Ahmad. “The Role of IoT in Digital Governance.” Employing

Recent Technologies for Improved Digital Governance. IGI Global, 2020. 128-150. Web. 31 Jan. 2020. doi:10.4018/978- 1-7998-1851-9.ch007

Maher Omar Alshammari, Abdulmohsen A. Almulhem and Noor Zaman, “Internet of Things (IoT): Charity Automation” International Journal of Advanced Computer Science and Applications (IJACSA), 8(2), 2017

Teoh Joo Fong, Azween Abdullah, NZ Jhanjhi, Mahadevan Supramaniam, “The Coin Passcode – A Shoulder-Surfing Proof Graphical Password Authentication Model for Mobile Devices”, in International Journal of Advanced Computer Science and Applications (IJACSA), Vol 10, No, 1, pp. 302-

, 2019

Alyssa Anne Ubing, Syukrina Kamilia Binti Jasmi, Azween Abdullah, NZ Jhanjhi and Mahadevan Supramaniam, “Phishing Website Detection: An Improved Accuracy through Feature Selection and Ensemble Learning” International Journal of Advanced Computer Science and Applications(IJACSA), 10(1), 2019. http://dx.doi.

org/10.14569/IJACSA.2019.0100133

Fatima-tuz-Zahra, N. Jhanjhi, S. N. Brohi and N. A. Malik, “Proposing a Rank and Wormhole Attack Detection Framework using Machine Learning,” 2019 13thInternational Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS), Karachi, Pakistan, 2019, pp. 1-9

Zahrah A.Almusaylim, AbdulazizAlhumam, N.Z.Jhanjhi, Proposing a Secure RPL based Internet of Things Routing Protocol: A Review, in Ad Hoc Networks, https://doi. org/10.1016/j.adhoc.2020.102096

A. Diro, H. Reda, N. Chilamkurti, A. Mahmood, N. Zaman and Y. Nam, “Lightweight Authenticated-Encryption Scheme for Internet of Things Based on Publish-Subscribe Communication,” in IEEE Access, vol. 8, pp. 60539- 60551, 2020.

Published

2022-07-25

How to Cite

The Effects of Iot- New Features on Security and Privacy. (2022). Trinity Journal of Management, IT & Media (TJMITM), 13(Special Issue), 179–183. https://doi.org/10.48165/acspublisher.tjmitm.2022.14