Internet of Things (IoT): Application Systems and Security Vulnerabilities

被引:0
|
作者
Ahamed, Jinesh [1 ]
Rajan, Amala V. [1 ]
机构
[1] Higher Coll Technol, Dubai Womens Coll, Comp & Informat Sci Dept, Dubai, U Arab Emirates
关键词
Internet of Things; IoT applications; cyber security vulnerabilities;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
IoT (Internet of Things) is a system where objects are embedded with sensor technology to interact with each other over wireless communication medium to generate, exchange and transfer data without human interaction. It provides interaction between physical world and cyber world which is known as cyber physical systems. IoT can be implemented as smart cities, smart homes, traffic management systems etc. Research has proven that, any system with the characteristics of remote management, dynamic topology, resource constraints and wireless communication medium are always susceptible to security issues. This research aims to investigate and identify the specific types of IoT applications suitable for UAE, analyse the potential security threats associated them and their impacts on these applications. A thorough exploration and review of the available literature has been done to identify the IoT application systems and related cyber vulnerabilities.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Internet of Things: Security Vulnerabilities and Challenges
    Andrea, Ioannis
    Chrysostomou, Chrysostomos
    Hadjichristofi, George
    [J]. 2015 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2015, : 180 - 187
  • [2] Internet of Things (IoT) Security
    Kulkarni, Shivaji
    Durg, Shrihari
    Iyer, Nalini
    [J]. PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 821 - 824
  • [3] Security in the Internet of Things (IoT)
    Ahmed, Israr
    Saleel, A. P.
    Beheshti, Babak
    Khan, Zahoor Ali
    Ahmad, Imtiaz
    [J]. 2017 FOURTH HCT INFORMATION TECHNOLOGY TRENDS (ITT), 2017, : 84 - 90
  • [4] Exploring security threats and solutions Techniques for Internet of Things (IoT): from vulnerabilities to vigilance
    Sahu, Swastik Kumar
    Mazumdar, Kaushik
    [J]. FRONTIERS IN ARTIFICIAL INTELLIGENCE, 2024, 7
  • [5] Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures
    Butun, Ismail
    Osterberg, Patrik
    Song, Houbing
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01): : 616 - 644
  • [6] Aspects of Application Security for Internet of Things Systems
    Poniszewska-Maranda, Aneta
    Wieczorek, Bartosz
    [J]. MOBILE WEB AND INTELLIGENT INFORMATION SYSTEMS, MOBIWIS 2017, 2017, 10486 : 163 - 176
  • [7] Investigating Radio Frequency Vulnerabilities in the Internet of Things (IoT)
    Anthi, Eirini
    Williams, Lowri
    Ieropoulos, Vasilis
    Spyridopoulos, Theodoros
    [J]. IOT, 2024, 5 (02): : 356 - 380
  • [8] Threats and Vulnerabilities of Wireless Networks in the Internet of Things (IoT)
    [J]. 1600, Institute of Electrical and Electronics Engineers Inc.
  • [9] Internet of Things (IoT) Security Platforms
    Waz, Ibrahim R.
    Sobh, Mohamed Ali
    Bahaa-Eldin, Ayman M.
    [J]. 2017 12TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES), 2017, : 500 - 507
  • [10] Security Requirements for Internet of Things (IoT)
    Jaiswal, Shruti
    Gupta, Daya
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORKS, 2017, 508 : 419 - 427