DSpace logo

Please use this identifier to cite or link to this item: http://dspace.bits-pilani.ac.in:8080/jspui/xmlui/handle/123456789/9748
Full metadata record
DC FieldValueLanguage
dc.contributor.authorChamola, Vinay-
dc.date.accessioned2023-03-15T09:47:15Z-
dc.date.available2023-03-15T09:47:15Z-
dc.date.issued2019-06-
dc.identifier.urihttps://ieeexplore.ieee.org/abstract/document/8742551-
dc.identifier.urihttp://dspace.bits-pilani.ac.in:8080/xmlui/handle/123456789/9748-
dc.description.abstractThe Internet of Things (IoT) is the next era of communication. Using the IoT, physical objects can be empowered to create, receive, and exchange data in a seamless manner. Various IoT applications focus on automating different tasks and are trying to empower the inanimate physical objects to act without any human intervention. The existing and upcoming IoT applications are highly promising to increase the level of comfort, efficiency, and automation for the users. To be able to implement such a world in an ever-growing fashion requires high security, privacy, authentication, and recovery from attacks. In this regard, it is imperative to make the required changes in the architecture of the IoT applications for achieving end-to-end secure IoT environments. In this paper, a detailed review of the security-related challenges and sources of threat in the IoT applications is presented. After discussing the security issues, various emerging and existing technologies focused on achieving a high degree of trust in the IoT applications are discussed. Four different technologies, blockchain, fog computing, edge computing, and machine learning, to increase the level of security in IoT are discussed.en_US
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.subjectEEEen_US
dc.subjectInternet of Things (IoT)en_US
dc.subjectIoT securityen_US
dc.subjectBlockchainen_US
dc.subjectFog computingen_US
dc.subjectEdge computingen_US
dc.subjectMachine Learningen_US
dc.subjectIoT Applicationsen_US
dc.titleA Survey on IoT Security: Application Areas, Security Threats, and Solution Architecturesen_US
dc.typeArticleen_US
Appears in Collections:Department of Electrical and Electronics Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.