Journal Press India®

The Technologies of IOT with Security and Application Areas

Vol 5 , Issue 2 , July - December 2022 | Pages: 72-80 | Research Paper  

https://doi.org/10.51976/jfsa.522210


Author Details ( * ) denotes Corresponding author

1. * Anurag Kumar, Assistant Professor, Department of Computer Science & Engineering, I. E. T, Bundelkhand University, Jhansi, Uttar Pradesh, India (anuragkumarrediff@gmail.com)
2. Sheo Kumar, Professor, Department of Computer Science & Engineering, CMR Engineering College, Medchal, Kandlakoya, Telangana, India (sheo2008@gmail.com)

From small wearable devices to big industrial systems, The Internet of Things (IoT) is changing modern’s life drastically. The IoT requires facilities and services that constituted ubiquity, dependability, high performance, efficiency, and scalability. In coming future, more organization and resale data will be needed to complete this attribution. Some Internet of Things (IoT) apps help automate procedures and enable inanimate physical objects to work without human intervention. In this paper, several threats numerous technologies are discussed, along with their benefits and many applications of IoT, such as IoT in healthcare, industries, smart cities, and many more.

Keywords

IoT; Security; RFID; WSN; Application


  1. Atlam, Hany F., and Gary B. Wills. “IoT security, privacy, safety and ethics.” Digital twin technologies and smart cities. Springer, Cham, 2020. 123-149.

  2. Farooq, M. Umar, et al. “A review on internet of things (IoT).” International journal of computer applications 113.1 (2015): 1-7.

  3. Vaishali Yadav and V. K. Tomar, “A Low Leakage with enhance write margin 10T SRAM cell for IoT applications” published in oceedings of “International Conference on Micro/Nanoelectronics Devices, Circuits and Systems (MNDCS-2021), National Institute of Technology, Silchar, 30-31 January 2021. pp 201-211 Print ISBN: 978-981-16-3766-7,  https://link.springer.com/chapter/10.1007/978-981-16-3767-4_19,Editors- Dr. Trupti Ranjan Lenka, Prof. Durgamadhab Misra, Prof. Dr. Arindam Biswas Publisher: Springer Singapore

  4. Thakurendra Singh and V. K. Tomar, “Post Simulation of High Speed Sense Amplifiers using  45 nm CMOS Technology Used in IOT application” 2nd International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC 2022) held during 21st -22nd January, 2022 organized by Department of Electrical Engineering, GLA University, Mathura, India DOI: 10.1109/PARC52418.2022.9726536

  5. Hwang, Yong Ho. “Iot security & privacy: threats and challenges.” Proceedings of the 1st ACM workshop on IoT privacy, trust, and security. 2015.

  6. Hassija, Vikas, et al. “A survey on IoT security: application areas, security threats, and solution architectures.” IEEE Access 7 (2019): 82721-82743.

  7. Ammar, Mahmoud, Giovanni Russello, and Bruno Crispo. “Internet of Things: A survey on the security of IoT frameworks.” Journal of Information Security and Applications 38 (2018): 8-27.

  8. Vivek Kumar and V. K. Tomar “A Comparative Performance Analysis of 6T,  7T and 8T SRAM Cells in 18nm FinFET Technology”, Presented in International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC 2020) on 28-29 Febuary,2020 at GLA University, Mathura .(PP-329-333) ISBN No- 978-1-7281-6576-9, DOI: 10.1109/PARC49193.2020.236620

  9. Xu, Teng, James B. Wendt, and Miodrag Potkonjak. “Security of IoT systems: Design challenges and opportunities.” 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD). IEEE, 2014.

  10. Deogirikar, Jyoti, and Amarsinh Vidhate. “Security attacks in IoT: A survey.” 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC). IEEE, 2017.

  11. Ray, Partha Pratim. “A survey of IoT cloud platforms.” Future Computing and Informatics Journal 1.1-2 (2016): 35-46.

  12. Nižetić, Sandro, et al. “Internet of Things (IoT): Opportunities, issues and challenges towards a smart and sustainable future.” Journal of Cleaner Production 274 (2020): 122877.

  13. Ammar, Mahmoud, Giovanni Russello, and Bruno Crispo. “Internet of Things: A survey on the security of IoT frameworks.” Journal of Information Security and Applications 38 (2018): 8-27.

  14. Ngu, Anne H., et al. “IoT middleware: A survey on issues and enabling technologies.” IEEE Internet of Things Journal 4.1 (2016): 1-20.

  15. Lee, In, and Kyoochun Lee. “The Internet of Things (IoT): Applications, investments, and challenges for enterprises.” Business horizons 58.4 (2015): 431-440.

  16. Zhang, Zhi-Kai, et al. “IoT security: ongoing challenges and research opportunities.” 2014 IEEE 7th international conference on service-oriented computing and applications. IEEE, 2014.

  17. Biswas, Abdur Rahim, and Raffaele Giaffreda. “IoT and cloud convergence: Opportunities and challenges.” 2014 IEEE World Forum on Internet of Things (WF-IoT). IEEE, 2014.

  18. Shukla, Aasheesh. “Optimal Multiple Access Scheme for 5G and Beyond Communication Network.” International Conference on Information and Communication Technology for Intelligent Systems. Springer, Singapore, 2020

Abstract Views: 7
PDF Views: 220

Related Articles
Enhanced Cybersecurity Framework for 5G-Integrated Oil and Gas Industry
Daniel Dauda Wisdom, Olufunke Rebecca Vincent, Oduntan Odunayo Esther, Kingsley T. Igulu, Alpha Baba Garba
A Review of Best Practices and Methods of Mitigating Cybersecurity Risks in Healthcare Systems and a Newly Proposed Algorithm
Daniel D. Wisdom, Kingsley T. Igulu, Oduntan O. Esther, Garba A. Baba, Abdulmalik Ahmad, Abdullahi Sidi

By continuing to use this website, you consent to the use of cookies in accordance with our Cookie Policy.