Skip to main content

Internet of Things: Illuminating and Study of Protection and Justifying Potential Countermeasures

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 898))

Abstract

Presently, Internet of things (IoTs) contains environs with explore in innumerable mixed plans are linked by the classes of Internet. That decides the plans in novel capability. Such having a important responsibility in the privacy of informatics. Conservatively, security method would not be directly sensible to IoT knowledge due to the different philosophy and communiqué alarmed. Here crucial study is complete in divulge the safety and solitude with IoT plans and quarrel diverse contradict events alleviate that supply the potential extent for subsequently investigate with IoT coerce.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Arseni, S., Halunga, S., Fratu, O., Vulpe, A., Suciu, G.: Analysis of the security solutions implemented in current Internet of Things platforms. In: 2015 Conference Grid, Cloud & High Performance Computing in Science (ROLCG) (2015)

    Google Scholar 

  2. Mosenia, A., Jha, N.: A comprehensive study of security of Internet-of-Things. IEEE Trans. Emerg. Topics Comput. 4, 586–602 (2017)

    Article  Google Scholar 

  3. Okul, S., Ali Aydin, M.: Security attacks on IoT. In: 2017 International Conference on Computer Science and Engineering (UBMK) (2017)

    Google Scholar 

  4. Daniel, M.: Hidden dangers of Internet of Things. Women Secur. 69–75 (2017)

    Google Scholar 

  5. Haber, M., Hibbert, B.: Internet of Things (IoT). In: Privileged Attack Vectors, pp. 139–142 (2017)

    Google Scholar 

  6. Alioto, M., Shahghasemi, M.: The Internet of Things on its edge: trends toward its tipping point. IEEE Consum. Electron. Mag. 7(1), 77–87 (2018)

    Article  Google Scholar 

  7. Jaiswal, S., Gupta, D.: Security requirements for Internet of Things (IoT). Adv. Intel. Syst. Comput. 419–427 (2017)

    Google Scholar 

  8. Al-Gburi, A., Al-Hasnawi, A., Lilien, L.: Differentiating security from privacy in Internet of Things: a survey of selected threats and controls. In: Computer and Network Security Essentials, pp. 153–172 (2017)

    Google Scholar 

  9. Adat, V., Gupta, B.: Security in Internet of Things: issues, challenges, taxonomy, and architecture. Telecommun. Syst. (2017)

    Google Scholar 

  10. Sain, M., Kang, Y., Lee, H.: Survey on security in Internet of Things: state of the art and challenges. In: 2017 19th International Conference on Advanced Communication Technology (ICACT) (2017)

    Google Scholar 

  11. Payne, B., Abegaz, T.: Securing the Internet of Things: best practices for deploying IoT devices. Comput. Netw. Secur. Essent. 493–506 (2017)

    Google Scholar 

  12. Dawson, M.: Cyber security policies for hyperconnectivity and Internet of Things: a process for managing connectivity. Adv. Intell. Syst. Comput. 911–914 (2017)

    Google Scholar 

  13. Banerjee, M., Lee, J., Choo, K.: A blockchain future to Internet of Things security: a position paper. Dig. Commun. Netw. (2017)

    Google Scholar 

  14. Lopes De Faria, M., Cugnasca, C., Amazonas, J.: Insights into IoT data and an innovative DWT-based technique to denoise sensor signals. IEEE Sens. J. 18(1), 237–247 (2018)

    Article  Google Scholar 

  15. Wolf, M., Serpanos, D.: Safety and security in cyber-physical systems and Internet-of-Things systems. Proc. IEEE 106(1), 9–20 (2018)

    Article  Google Scholar 

  16. Hong, S., Kim, Y., Kim, G.: Developing usable interface for Internet of Things (IoT) security analysis software. In: Human Aspects of Information Security, Privacy and Trust, pp. 322–328 (2017)

    Chapter  Google Scholar 

  17. Mohanty, S., Huebner, M., Xue, C., Li, X., Li, H.: Guest editorial circuit and system design automation for Internet of Things. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37(1), 3–6 (2018)

    Article  Google Scholar 

  18. Fu, Y., Yan, Z., Cao, J., Koné, O., Cao, X.: An automata based intrusion detection method for Internet of Things. Mob. Inf. Syst. 2017, 1–13 (2017)

    Google Scholar 

  19. Dahabiyeh, L.: The security of Internet of Things: current state and future directions. Inf. Syst. 414–420 (2017)

    Google Scholar 

  20. Malik, A., Om, H.: Cloud computing and Internet of Things integration: architecture, applications, issues, and challenges. In: Sustainable Cloud and Energy Services, pp. 1–24 (2017)

    Google Scholar 

  21. Oppitz, M., Tomsu, P.: Internet of Things. In: Inventing the Cloud Century, pp. 435–469 (2017)

    Google Scholar 

  22. Hammi, B., Khatoun, R., Zeadally, S., Fayad, A., Khoukhi, L.: IoT technologies for smart cities. IET Netw. 7(1), 1–13 (2018)

    Article  Google Scholar 

  23. Shahid, A., Khalid, B., Shaukat, S., Ali, H., Qadri, M.: Internet of Things shaping smart cities: a survey. In: Studies in Big Data, pp. 335–358 (2017)

    Google Scholar 

  24. Javdani, H., Kashanian, H.: Internet of Things in medical applications with a service-oriented and security approach: a survey. Health Technol. (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nitesh Chouhan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chouhan, N., Saini, H.K., Jain, S.C. (2019). Internet of Things: Illuminating and Study of Protection and Justifying Potential Countermeasures. In: Wang, J., Reddy, G., Prasad, V., Reddy, V. (eds) Soft Computing and Signal Processing . Advances in Intelligent Systems and Computing, vol 898. Springer, Singapore. https://doi.org/10.1007/978-981-13-3393-4_3

Download citation

Publish with us

Policies and ethics