Successive Security Challenges Implementation on Internet of Things

Abstract

This Paper demonstrates commonly used communication scheme and information retrieval which are carried out via Internet using numerous types of smart devices, can turn the Internet into a very dangerous platform because of its built-in nature of making its users identity easily traceable and discusses some countermeasures that can be used to prevent existing and projected security breaches. It initially provides some introductory information on technology advancement, penetration of the Internet to all aspects of our life and its associated conveniences. It then discusses vulnerability of internet services, presents some typical attack cases that are carried out via smart home appliances, and explains security implementation challenges on such devices from technical, social, and practical aspects. Finally, it proposes an appropriate security model, demonstrates relevant counter measures for numerous attack scenarios, and explains why and how numerous stake holders are needed to get together for its commercial implementation. M. Ann Bency"Successive Security Challenges Implementation on Internet of Things" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018, URL: http://www.ijtsrd.com/papers/ijtsrd8342.pdf http://www.ijtsrd.com/engineering/computer-engineering/8342/successive-security-challenges-implementation-on-internet-of-things/m-ann-bency

Authors and Affiliations

Keywords

Related Articles

Structural Analysis and Design of Structural Elements of A Building

Structural design is primary aspect of Civil Engineering. The very basis of construction of any building, residential house or dams or bridges, culverts, canals etc. is designing. Structural engineering has existed since...

Effect of Compensation and Work Motivation on Employee Performance in the Pt. Pos Indonesia Persero Medan

Compensation is all income in the form of money, direct or indirect goods received by employees in return for services provided to the company. Work Motivation is a skill in directing employees and organizations to want...

An Experimental Study on Shear Strength of Soil Sub Grade using Cement as Stabilizing Agent

Soil stabilization is the process of altering some soil properties by different methods, mechanical or chemical in order to produce an improved soil material which has all the desired engineering properties. Soils are ge...

Analysis of Infrastructure Building Policies in India Meeting SDG 9

This paper focuses on Indian economy in the light of sustainable development goal number 9. Indian economy is a developing mixed economy. It is world's sixth largest economy in terms of nominal GDP and third largest econ...

New Adaptive Cooperative-MIMO for LTE Technology

Multiple Input Multiple Output (MIMO) systems have been widely used in an area of wireless cellular communication system, providing the both increased capacity and reliability. However, the use of multiple antennas in mo...

Download PDF file
  • EP ID EP359050
  • DOI -
  • Views 110
  • Downloads 0

How To Cite

(2018). Successive Security Challenges Implementation on Internet of Things. International Journal of Trend in Scientific Research and Development, 2(2), -. https://www.europub.co.uk/articles/-A-359050