Security aspects and efforts towards secure Internet of things
Abstract—Internet of Things (IoT) consists of wired and wireless devices, typically supplied with minimum physical resources including limited computational and communication resources. Most of the devices are distinguished by their low bandwidth, short range, scarce memory capacity, limited process...
| Main Authors: | Wan Abdul Rahman, Wan Fariza, Hassan Abdalla Hashim, Aisha, Islam, Md Rafiqul |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
Universiti Teknikal Malaysia Melaka (UTEM)
2017
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/60140/ http://irep.iium.edu.my/60140/1/60140_Security%20Aspects%20and%20Efforts%20Towards.pdf http://irep.iium.edu.my/60140/2/60140_Security%20Aspects%20and%20Efforts%20Towards_SCOPUS.pdf |
Similar Items
Internet of things security vulnerabilities and recommended solutions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
Internet of things: the concept, inherent security challenges
and recommended solutions
by: Khan, Burhan Ul Islam, et al.
Published: (2019)
by: Khan, Burhan Ul Islam, et al.
Published: (2019)
Autonomic computing in internet of things for resource management
by: Ashraf, Qazi Mamoon, et al.
Published: (2015)
by: Ashraf, Qazi Mamoon, et al.
Published: (2015)
Investigation of internet of things handover process for information centric networking and proxy mobile internet protocol
by: Mohd Aman, Azana Hafizah, et al.
Published: (2019)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2019)
The rise of internet of things and big data on the cloud: challenges and future trends
by: Laouratou, Diallo, et al.
Published: (2017)
by: Laouratou, Diallo, et al.
Published: (2017)
Development of web-based surveillance system for Internet of Things (IoT) application
by: Ibrahim, Siti Noorjannah, et al.
Published: (2019)
by: Ibrahim, Siti Noorjannah, et al.
Published: (2019)
On the review and setup of security audit using Kali Linux
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
Smart home system using internet of things: design, implementation and sample codes
by: Yaldi, Intan Rahmithul Husna, et al.
Published: (2018)
by: Yaldi, Intan Rahmithul Husna, et al.
Published: (2018)
Rehashing system security solutions in e-banking
by: Khan, Burhan ul Islam, et al.
Published: (2018)
by: Khan, Burhan ul Islam, et al.
Published: (2018)
Secure annihilation of out-of-band authorization for
online transactions
by: Hussain, Sabahat, et al.
Published: (2018)
by: Hussain, Sabahat, et al.
Published: (2018)
Investigation on routing aspects towards RPL optimization
by: Wan Abdul Rahman, Wan Fariza, et al.
Published: (2015)
by: Wan Abdul Rahman, Wan Fariza, et al.
Published: (2015)
Securing electronic transactions via payment gateways: a systematic review
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
A critical insight into the effectiveness of research
methods evolved to secure IoT ecosystem
by: Khan, Burhan ul Islam, et al.
Published: (2018)
by: Khan, Burhan ul Islam, et al.
Published: (2018)
A novel multi-agent and multilayered game formulation for Intrusion Detection in Internet of Things (IoT)
by: Khan, Burhan Ul Islam, et al.
Published: (2020)
by: Khan, Burhan Ul Islam, et al.
Published: (2020)
Smart portable security system
by: Mohamad Isa, Mohamad Nabil Amiruddin, et al.
Published: (2020)
by: Mohamad Isa, Mohamad Nabil Amiruddin, et al.
Published: (2020)
Securing medical data transmission systems based on integrating algorithm of encryption and steganography
by: Hashim, Mohammed Mahdi, et al.
Published: (2020)
by: Hashim, Mohammed Mahdi, et al.
Published: (2020)
An efficient secure ECG compression based on 2D-SPIHT and SIT algorithm
by: Jati, Grafika, et al.
Published: (2017)
by: Jati, Grafika, et al.
Published: (2017)
Development of an autonomous remote access water quality monitoring system
by: Ranjbar, Md. Reza, et al.
Published: (2017)
by: Ranjbar, Md. Reza, et al.
Published: (2017)
Parameters used in gateway selection schemes for Internet connected MANETs: a review
by: Mahmood, Zainab S., et al.
Published: (2015)
by: Mahmood, Zainab S., et al.
Published: (2015)
Performance evaluation of joint path and spectrum diversity based routing protocol in Cognitive Radio Ad Hoc Networks under critical conditions
by: Che-Aron, Zamree, et al.
Published: (2015)
by: Che-Aron, Zamree, et al.
Published: (2015)
A fault-tolerant multi-path multi-channel routing protocol for Cognitive Radio Ad Hoc Networks
by: Che-Aron, Zamree, et al.
Published: (2015)
by: Che-Aron, Zamree, et al.
Published: (2015)
Hierarchical route optimization scheme using advanced binding update list (BUL+) for nested mobile networks
by: Shayma, Senan, et al.
Published: (2017)
by: Shayma, Senan, et al.
Published: (2017)
Performance aAnalysis of HRO-B+ scheme for the nested mobile networks using OPNet
by: Shayma, Senan, et al.
Published: (2017)
by: Shayma, Senan, et al.
Published: (2017)
Smart locker with automatic light and security system
by: Adan, Nor Faezah, et al.
Published: (2020)
by: Adan, Nor Faezah, et al.
Published: (2020)
Enhancement of bluetooth security
authentication using hash-based message
authentication code (HMAC) algorithm
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
MM-PNEMO: a mathematical model to assess handoff delay
and packet loss
by: Islam, Shayla, et al.
Published: (2019)
by: Islam, Shayla, et al.
Published: (2019)
Towards an ethical online payment system through cryptography and next generation communication network
by: Hassan, Marwa Yousif, et al.
Published: (2017)
by: Hassan, Marwa Yousif, et al.
Published: (2017)
Analysis of cost minimization methods in geo-distributed data centers
by: Khalaf, Ayesheh Ahrari, et al.
Published: (2016)
by: Khalaf, Ayesheh Ahrari, et al.
Published: (2016)
A scalable routing protocol for hybrid wireless mesh networks
by: Mahmod, Zainab Senan, et al.
Published: (2012)
by: Mahmod, Zainab Senan, et al.
Published: (2012)
A scheme (Diff NEMO) for enhancing QoS in network mobility
by: Hussein, Loay Faisal, et al.
Published: (2015)
by: Hussein, Loay Faisal, et al.
Published: (2015)
Internet of things security implementation using blockchain for wireless technology
by: Karim, Karim Jabur
Published: (2019)
by: Karim, Karim Jabur
Published: (2019)
Performance analysis of multicast ad-hoc on-demand distance vector (MAODV) routing protocol
by: Suryady, Zeldi, et al.
Published: (2014)
by: Suryady, Zeldi, et al.
Published: (2014)
Developing a finite difference time domain (fdtd) software for solving large electromagnetic problems
by: Islam, Md. Rafiqul
Published: (2012)
by: Islam, Md. Rafiqul
Published: (2012)
Internet of things (IoT); security requirements, attacks and counter measures
by: Imdad, Maria, et al.
Published: (2020)
by: Imdad, Maria, et al.
Published: (2020)
Factors Influencing The Adoption Of Internet Of Things For Home Security In Dhaka Households
by: Mahmud, Arif
Published: (2023)
by: Mahmud, Arif
Published: (2023)
Performance evaluation of multi-interfaced fast handoff scheme for PNEMO Environment
by: Islam, Shayla, et al.
Published: (2018)
by: Islam, Shayla, et al.
Published: (2018)
Performance analysis for cloud query encryption
by: Ali Raheem, Zainalabideen, et al.
Published: (2019)
by: Ali Raheem, Zainalabideen, et al.
Published: (2019)
A QoS awareness scheme sustaining seamless handover for network mobility
by: Loay F. Hussein, Loay F., et al.
Published: (2016)
by: Loay F. Hussein, Loay F., et al.
Published: (2016)
Hybrid approach support Qos for mobile users
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2014)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2014)
Evaluation of MIPv6 approach to provide multicast to mobile nodes
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2014)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2014)
Similar Items
-
Internet of things security vulnerabilities and recommended solutions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018) -
Internet of things: the concept, inherent security challenges
and recommended solutions
by: Khan, Burhan Ul Islam, et al.
Published: (2019) -
Autonomic computing in internet of things for resource management
by: Ashraf, Qazi Mamoon, et al.
Published: (2015) -
Investigation of internet of things handover process for information centric networking and proxy mobile internet protocol
by: Mohd Aman, Azana Hafizah, et al.
Published: (2019) -
The rise of internet of things and big data on the cloud: challenges and future trends
by: Laouratou, Diallo, et al.
Published: (2017)