Internet of things: the concept, inherent security challenges and recommended solutions
The exponential growth observed as well as predicted in the development and deployment of the Internet of Things (IoT) based applications in every walk of our life brings forth the mandatory requirement of the secure communication system which is seamless yet effective in the highly heterogeneous a...
| Main Authors: | Khan, Burhan Ul Islam, Olanrewaju, Rashidah Funke, Anwar, Farhat, Mir, Roohie Naaz, Oussama, Allama, Jusoh, Ahmad Zamani |
|---|---|
| Other Authors: | Elhoseny, Mohamed |
| Format: | Book Chapter |
| Language: | English |
| Published: |
Springer, Singapore
2019
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/75995/ http://irep.iium.edu.my/75995/1/75995_Internet%20of%20things%20the%20concept.pdf |
Similar Items
Internet of things security vulnerabilities and recommended solutions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
A novel multi-agent and multilayered game formulation for Intrusion Detection in Internet of Things (IoT)
by: Khan, Burhan Ul Islam, et al.
Published: (2020)
by: Khan, Burhan Ul Islam, et al.
Published: (2020)
A critical insight into the effectiveness of research
methods evolved to secure IoT ecosystem
by: Khan, Burhan ul Islam, et al.
Published: (2018)
by: Khan, Burhan ul Islam, et al.
Published: (2018)
DFAM: A distributed feedback analysis mechanism for knowledge based educational big data
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
Securing electronic transactions via payment gateways: a systematic review
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
A game theory-based strategic approach to ensure reliable data transmission with optimized network operations in futuristic Mobile Adhoc Networks
by: Khan, Burhan ul Islam, et al.
Published: (2020)
by: Khan, Burhan ul Islam, et al.
Published: (2020)
Scrutinising internet banking security solutions
by: Khan, Burhan ul Islam, et al.
Published: (2020)
by: Khan, Burhan ul Islam, et al.
Published: (2020)
Rehashing system security solutions in e-banking
by: Khan, Burhan ul Islam, et al.
Published: (2018)
by: Khan, Burhan ul Islam, et al.
Published: (2018)
An adaptive and viable face identification for Android mobile devices
by: Mehraj, Tehseen, et al.
Published: (2019)
by: Mehraj, Tehseen, et al.
Published: (2019)
Critical challenges in access management schemes for smartphones: an appraisal
by: Mehraj, Tehseen, et al.
Published: (2019)
by: Mehraj, Tehseen, et al.
Published: (2019)
ECM-GT: design of efficient computational modelling based on game theoretical approach towards enhancing the security solutions in MANET
by: Khan, Burhan Ul Islam, et al.
Published: (2019)
by: Khan, Burhan Ul Islam, et al.
Published: (2019)
Secure annihilation of out-of-band authorization for
online transactions
by: Hussain, Sabahat, et al.
Published: (2018)
by: Hussain, Sabahat, et al.
Published: (2018)
MANET security appraisal: Challenges, essentials, attacks, countermeasures & future directions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
A comprehensive insight into game theory in relevance to cyber security
by: Anwar, Farhat, et al.
Published: (2020)
by: Anwar, Farhat, et al.
Published: (2020)
Bayesian signaling game based efficient security model for MANETs
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
Autonomic computing in internet of things for resource management
by: Ashraf, Qazi Mamoon, et al.
Published: (2015)
by: Ashraf, Qazi Mamoon, et al.
Published: (2015)
Security aspects and efforts towards secure Internet of things
by: Wan Abdul Rahman, Wan Fariza, et al.
Published: (2017)
by: Wan Abdul Rahman, Wan Fariza, et al.
Published: (2017)
Offline OTP based solution for secure internet banking access
by: Khan, Burhan ul Islam, et al.
Published: (2019)
by: Khan, Burhan ul Islam, et al.
Published: (2019)
Investigation of internet of things handover process for information centric networking and proxy mobile internet protocol
by: Mohd Aman, Azana Hafizah, et al.
Published: (2019)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2019)
An efficient cache replacement algorithm for minimizing the error rate in L2-STT-MRAM caches
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
The rise of internet of things and big data on the cloud: challenges and future trends
by: Laouratou, Diallo, et al.
Published: (2017)
by: Laouratou, Diallo, et al.
Published: (2017)
Development of web-based surveillance system for Internet of Things (IoT) application
by: Ibrahim, Siti Noorjannah, et al.
Published: (2019)
by: Ibrahim, Siti Noorjannah, et al.
Published: (2019)
RAED: Response analysis of educational data for leveraging knowledge dissemination system
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
Strategic profiling for behaviour visualization of malicious node in MANETs using game theory
by: Khan, Burhan ul Islam, et al.
Published: (2015)
by: Khan, Burhan ul Islam, et al.
Published: (2015)
Smart home system using internet of things: design, implementation and sample codes
by: Yaldi, Intan Rahmithul Husna, et al.
Published: (2018)
by: Yaldi, Intan Rahmithul Husna, et al.
Published: (2018)
RAED: Response Analysis of Educational Data for
leveraging knowledge dissemination system
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
DTASR: Dual Threshold-based authentication for secure routing in mobile adhoc network
by: Khan, Burhan ul Islam, et al.
Published: (2015)
by: Khan, Burhan ul Islam, et al.
Published: (2015)
Trust and resource oriented communication scheme in mobile ad hoc networks
by: Khan, Burhan Ul Islam, et al.
Published: (2018)
by: Khan, Burhan Ul Islam, et al.
Published: (2018)
DTASR: Dual Threshold-based authentication for secure routing in mobile adhoc network
by: Khan, Burhan ul Islam, et al.
Published: (2015)
by: Khan, Burhan ul Islam, et al.
Published: (2015)
A computationally efficient P-LRU based optimal cache heap object replacement policy
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
RFDA: Reliable framework for data administration based on split-merge policy
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
Game theoretic approach for exhaustive tactical modelling of node misbehavior in adhoc networking based IOT paradigm/P-RIGS18-020-0020
by: Olanrewaju, Rashidah Funke Olanrewaju, et al.
Published: (2019)
by: Olanrewaju, Rashidah Funke Olanrewaju, et al.
Published: (2019)
Bandwith conservation framework for mobile cloud computing: challenges and solutions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
A cloud-based bus tracking system based on internet-of-things technology
by: Akter, Sharmin, et al.
Published: (2019)
by: Akter, Sharmin, et al.
Published: (2019)
CDR analysis using big data technology
by: Elagib, Sara B., et al.
Published: (2016)
by: Elagib, Sara B., et al.
Published: (2016)
A study on performance evaluation of conventional cache replacement algorithms: A review
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
The concept of internet of things and its challenges to privacy
by: Mohamed, Sidi Mohamed Ould, et al.
Published: (2015)
by: Mohamed, Sidi Mohamed Ould, et al.
Published: (2015)
The concept of internet of things and its challenges to privacy
by: Mohamed, Sidi Mohamed Ould, et al.
Published: (2015)
by: Mohamed, Sidi Mohamed Ould, et al.
Published: (2015)
Enhancement of bluetooth security
authentication using hash-based message
authentication code (HMAC) algorithm
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
Similar Items
-
Internet of things security vulnerabilities and recommended solutions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018) -
A novel multi-agent and multilayered game formulation for Intrusion Detection in Internet of Things (IoT)
by: Khan, Burhan Ul Islam, et al.
Published: (2020) -
A critical insight into the effectiveness of research
methods evolved to secure IoT ecosystem
by: Khan, Burhan ul Islam, et al.
Published: (2018) -
DFAM: A distributed feedback analysis mechanism for knowledge based educational big data
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016) -
Securing electronic transactions via payment gateways: a systematic review
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)