2019
DOI: 10.7763/ijcte.2019.v11.1249
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Security Architecture of Internet of Things

Abstract: In this era, the preeminent internet of things industry paradigms grasps the pledge to transfigure the concept of communication with the connectivity of billions of devices and objects, that's why, IoT persuasion is being appraised for this revaluation. Thousands of scientists, researchers, scholars and organizations are endowing worthwhile attention to support this regime change. Reasoning from this fact, security and privacy issues of IoT are getting highest cogitations in this decade. In this paper, we revi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 96 publications
0
2
0
Order By: Relevance
“…Spoofing attack: The objective of this attack is that an attacker can try to prove a sender-side that a dead node is strong or a weak path is strong. An adversary can remove messages flow against the dead nodes (Ali et al, 2019a;2019b).…”
Section: Related Workmentioning
confidence: 99%
“…Spoofing attack: The objective of this attack is that an attacker can try to prove a sender-side that a dead node is strong or a weak path is strong. An adversary can remove messages flow against the dead nodes (Ali et al, 2019a;2019b).…”
Section: Related Workmentioning
confidence: 99%
“…In wireless communications it is absolutely provoking to list of challenges such as big data, data processing, data management, efficient battery management system, communication infrastructure, technology infrastructure, immaturity, standards, procuring, privacy breaches and last but not least security risks. So, privacy and security challenges of internet of things are most important [111]. Some parameter must be defined such as integrity, confidentiality, authentication, data management and interoperability to attain secure and reliable communication.…”
Section: Absence Of Security Layermentioning
confidence: 99%