The Effects of Iot- New Features on Security and Privacy
DOI:
https://doi.org/10.48165/acspublisher.tjmitm.2022.14Keywords:
Internet of things (IOT), IOT features, privacy and securityAbstract
IoT technology is drawing a very important communication line between individuals. It’s providing how of effective communication. Additionally to the current, it’s conjointly creating people’s life higher by providing how for good home systems, good agriculture systems and even additional good systems that folks want. The maximum amount as this technology is sweet as attackers attempt to exploit it during a unhealthy thanks to attack the IoT systems and build edges of innocent sensitive knowledge and data. This makes it necessary to develop ways and techniques that might defend IoT systems. That successively defend people’s sensitive info. Security and privacy of IoT systems became a challenge and a very important a part of IoT systems. Security and privacy problems take issue in their danger level. Some attacks are additional dangerous than different attacks. Also, attacks take issue in their supply some attacks are internal and different attacks are external. Attacks may be completely different however their negative have an effect on is that the same and vary within the dangerous level. This paper explains about the privacy and security, threats, attack etc.
References
Ruchi Parashar, Abid Khan, Neha, “A SURVEY:THE INTERNET OF THINGS,” InternationalJournal of Technical Research and Applications e-ISSN: 2320-8163, Volume 4, Issue 3 (May-June,2016).
M. Almulhim, and N. Zaman, “Proposing secure and lightweight authentication scheme for IoT based E-health applications”, 2018 20th International Conference on Advanced Communication Technology (ICACT), 481-487
Almulhim, and N. Zaman, “Proposing secure and lightweight authentication scheme for IoT based E-health applications”, 2018 20th International Conference on Advanced Communication Technology (ICACT), 481-487.
M. Almulhim, N. Islam and N. Zaman, “A Lightweight and Secure Authentication Scheme for IoT Based E-Health Applications”, International Journal of Computer Science and Network Security 19 (1), 107-120.
K. Hussain, S.J. Hussain, NZ. Jhanjhi and M. Humayun, “SYN Flood Attack Detection based on Bayes Estimator (SFADBE) For MANET”, International Conference on Computer and Information Sciences (ICCIS), 1-4, 2019.
K Hussain, NZ Jhanjhi, H Mati-ur-Rahman, J Hussain, MH Islam, Using a systematic framework to critically analyze proposed smart card based two factor authentication schemes, Journal of King Saud University- Computer and Information Sciences
S. Jawad Hussain, Usman Ahmed, H. Waqas, S. Mir, NZ. Jhanjhi, and M. Humayun, “IMIAD: Intelligent Malware Identification for Android Platform,” IEEE 2019 International Conference on Computer and Information Sciences (ICCIS), Al Jouf, Saudi Arabia, 2019
Humayun, M., Niazi, M., Jhanjhi, N. et al. Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study. Arab J Sci Eng (2020). https://doi.org/10.1007/s13369- 019-04319-2
Khan, Azeem, N. Z. Jhanjhi, Mamoona Humayun and Muneer Ahmad. “The Role of IoT in Digital Governance.” Employing
Recent Technologies for Improved Digital Governance. IGI Global, 2020. 128-150. Web. 31 Jan. 2020. doi:10.4018/978- 1-7998-1851-9.ch007
Maher Omar Alshammari, Abdulmohsen A. Almulhem and Noor Zaman, “Internet of Things (IoT): Charity Automation” International Journal of Advanced Computer Science and Applications (IJACSA), 8(2), 2017
Teoh Joo Fong, Azween Abdullah, NZ Jhanjhi, Mahadevan Supramaniam, “The Coin Passcode – A Shoulder-Surfing Proof Graphical Password Authentication Model for Mobile Devices”, in International Journal of Advanced Computer Science and Applications (IJACSA), Vol 10, No, 1, pp. 302-
, 2019
Alyssa Anne Ubing, Syukrina Kamilia Binti Jasmi, Azween Abdullah, NZ Jhanjhi and Mahadevan Supramaniam, “Phishing Website Detection: An Improved Accuracy through Feature Selection and Ensemble Learning” International Journal of Advanced Computer Science and Applications(IJACSA), 10(1), 2019. http://dx.doi.
org/10.14569/IJACSA.2019.0100133
Fatima-tuz-Zahra, N. Jhanjhi, S. N. Brohi and N. A. Malik, “Proposing a Rank and Wormhole Attack Detection Framework using Machine Learning,” 2019 13thInternational Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS), Karachi, Pakistan, 2019, pp. 1-9
Zahrah A.Almusaylim, AbdulazizAlhumam, N.Z.Jhanjhi, Proposing a Secure RPL based Internet of Things Routing Protocol: A Review, in Ad Hoc Networks, https://doi. org/10.1016/j.adhoc.2020.102096
A. Diro, H. Reda, N. Chilamkurti, A. Mahmood, N. Zaman and Y. Nam, “Lightweight Authenticated-Encryption Scheme for Internet of Things Based on Publish-Subscribe Communication,” in IEEE Access, vol. 8, pp. 60539- 60551, 2020.
Downloads
Published
Issue
Section
License
Copyright (c) 2022 Trinity Journal of Management, IT & Media (TJMITM)
This work is licensed under a Creative Commons Attribution 4.0 International License.