UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 4 | April 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 6 Issue 3
March-2019
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIRAU06050


Registration ID:
203342

Page Number

363-370

Share This Article


Jetir RMS

Title

A Survey on Internet of Things (IoT) Security

Abstract

The Internet covers things from different areas of study, including mobile computing (MC), distributed computing (PC), wireless sensor networks (WSN), and cyber physics (CPS). Internet speaks things to a sophisticated and variable field with many definitions [3]. This Internet paper describes things as a follow-up. Internet Objects (IoT): A wired or remote system of commonly known connected devices that can process information related to each other with or without human input A number of manufacturers have created and sold Internet tools that exclude sufficient security features. This has resulted in real, financial and other harm to open communities and to the general population. The ongoing state of this command involves DVRs and IP cameras that are currently being reviewed by XiongMai Technologies [1]. Because Internet objects proliferate, unless some steps are taken to verify these tools, subsequent damage may be increasingly severe. Corporate and individual customers in Internet tools may not have the specialized ability to evaluate the cost / advantage of acquiring appropriately verified and cost-effective tools. Furthermore, if the threats posed by the instruments affect third parties other than the producer or buyer of the instruments, at this stage there may be no money motive for the supplier or buyer to emphasize the security of the gadget. This paper is proposed to a secular group of peoples. The suggestions presented in this paper are generally proposed for development by manufacturers of Internet objects, however they are designed to be decomposable by unprofessional but successful legislators and producers of institutional and administrative strategies and members of standard setting bodies.

Key Words

Wireless Sensor Network, hardware MC, firmware, Protocols, Sensor network services, authentication, bandwidth.

Cite This Article

"A Survey on Internet of Things (IoT) Security", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.6, Issue 3, page no.363-370, March-2019, Available :http://www.jetir.org/papers/JETIRAU06050.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"A Survey on Internet of Things (IoT) Security", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.6, Issue 3, page no. pp363-370, March-2019, Available at : http://www.jetir.org/papers/JETIRAU06050.pdf

Publication Details

Published Paper ID: JETIRAU06050
Registration ID: 203342
Published In: Volume 6 | Issue 3 | Year March-2019
DOI (Digital Object Identifier):
Page No: 363-370
Country: -, -, - .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0002896

Print This Page

Current Call For Paper

Jetir RMS