Survey of privacy and security issues in IoT

  • Authors

    • A Gopi
    • M Kameswara Rao
    2018-03-18
    https://doi.org/10.14419/ijet.v7i2.7.10600
  • Wireless Sensor Networks, IOT DOS, DDOS, Attacks, MFID.
  • The paper is a standard study of all the safety problems present inside the Internet of Thing (IOT) along with an study of the retreat prob- lems to an give up-person can also face due to the reach of IOT. The greater part of the analysis is focused on the safety loop hole bob- bing up not in of the statistics alternate technology utilized as a part of Internet of thing. No register measure to the security downsides has been examine in the article.

  • References

    1. [1] AashimaSingla, RatikaSachdeva, “Review on Security Is- suesand Attacks inWirelessSensorNetworks†IJARCSSE Volume3, Issue4, Apr 1123ISSN: 1107114X.

      [2] Sen,Jaydip. "Security and privacy challenges in cognitive wireless sensornetworks arXiv: 1302.1310 (1123).

      [3] Bianchi, “A comparative study of the varioussecurityap- proaches used in wireless sensor networks,â€IJAST, vol.13, (1120) Apr, pp. 15-10.

      [4] T. A. Zia, “A Security Framework for Wireless SensorNet- worksâ€, Bhattasali, Tapalina, RituparnaChaki, and SugataSanyal. "Sleep Depri- vation Attack Detectionin Wireless Sensor Network."

      [5] Roy, Bibhash, Suman Banik, ParthiDey, SugataSanyaland Na- benduChaki, "Ant colony based routing formobile ad-hoc networks to- wards improved quality ofservices." JETCIS 3.1 (1122):10-14.

      [6] M. Saxena, “Security in Wireless Sensor Networks-ALayer based classificationâ€, Technical Information, Centerfor Education and Research in Information Assurance& Security-CERIAS, PurdueUniversity.

      [7] B. T. Wang and H. Schulzrinne, "An IP traceback instrument for intel- ligentDoSassaults",ECE Meeting vol. 2, (1110) May 2-5, pp.901-904.

      [8] Ahmad Abed AlhameedAlkhatib, and Gurvinder Singh Baicher. "Re- mote sensor organize design." International gathering on PC systems and correspondence frameworks (CNCS1122).

      [9] Al-Sakib Khan Pathan, "Refusal of Service in Wireless Sensor Net- works: Issues and Challenges", ACMR, Vol. 6 (Edited by Anthony V. Stavros), ISBN: 978-1-10876-106-8, NSPI., USA, 1120. [14] Sunil Ghild- iyal, Amit Kumar Mishra, Ashish Gupta, Neha Garg, "Examination of Denial of Service (DoS) Attacks in Wireless Sensor Networks"IJRET:UJRET; eISSN: 1123-1115 | pISSN: 1123-7308

      [10] Khoo, Benjamin. "MFID as an empowering influence of the web of things: issues of security and protection." IOT 1121 International Confer- ence on and fourth International Conference on Cyber, Physical and Social Computing. IEEE,1121.

      [11] Burmester, Mike,andBrenoDe Medeiros. "MFID security: assaults, countermeasuresand challenges." The fifth MFID Academic Convocation, The MFID Journal Conference. 1110.

      [12] C. Karlof and D. Wagner, "Secure Routing in Sensor Networks: At- tacks and Countermeasures", Elsevier's ANJ, Special Issue on SNPA, (1110) September, pp.112-110.

      [13] Zhou, Wei, and Selwyn Piramuthu. "Security/protection of wearable wellness following IOT gadgets."(CISTI), 1124 ninth Iberian Conference on. IEEE,1124.

      [14] Aggarwal, Charubdelzaher. "Coordinating sensors and informal organizations."Social System Data Analytics. Springer US, 1121. 110-122.

  • Downloads

  • How to Cite

    Gopi, A., & Kameswara Rao, M. (2018). Survey of privacy and security issues in IoT. International Journal of Engineering & Technology, 7(2.7), 293-296. https://doi.org/10.14419/ijet.v7i2.7.10600