Service selection mechanisms in the Internet of Things (IoT): a systematic and comprehensive study

2019 ◽  
Vol 23 (2) ◽  
pp. 1163-1183 ◽  
Author(s):  
Yunyan Li ◽  
Yuansheng Huang ◽  
Meimei Zhang ◽  
Lila Rajabion
2020 ◽  
Author(s):  
Navod Neranjan Thilakarathne ◽  
Mohan Krishna Kagita ◽  
Thippa Reddy Gadekallu

2019 ◽  
Vol 33 (2) ◽  
pp. e4179 ◽  
Author(s):  
Muhammet Usak ◽  
Milan Kubiatko ◽  
Muhammad Salman Shabbir ◽  
Olesya Viktorovna Dudnik ◽  
Kittisak Jermsittiparsert ◽  
...  

2018 ◽  
Vol 7 (2.32) ◽  
pp. 298 ◽  
Author(s):  
M Bhargavi ◽  
Dr M.Nagabhushana Rao

The Internet of Things (IoT) is a revolutionary model, with rising wireless sensor network technology. In IoT network devices are connected and communicated with each other or with human. IoT is extremely available to security assaults. In recent years, the internet of things has a continuous support in research. In the upcoming scenario, IoT will play an important role and changes our day-to-day life, principles as well as industry models. In this paper we provide ensuring security of data exchange, IoT architecture and IoT Security architecture, applications, drawbacks of IoT. We study about various security issues, Problems, normal and Denial of service attacks in different layers, issues and research defy in IoT are also discussed.   


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 85939-85949 ◽  
Author(s):  
Mehdi Hosseinzadeh ◽  
Quan Thanh Tho ◽  
Saqib Ali ◽  
Amir Masoud Rahmani ◽  
Alireza Souri ◽  
...  

Author(s):  
Tae-Ho Cho

The Internet of Things (IoT) is an ever evolving infrastructure of physical objects and Internet-enabled devices and systems featuring IP addresses for connectivity. Physical objects consist of home appliances, electronic gadgets, machinery, healthcare items, wearable devices and anything that could be connected to the Internet. Each type of connection requires particular types of security service. Security algorithms in user devices are fixed by default and selected based on preferences. This limitation causes energy waste since a user might be using all services in an algorithm, even those the user does not need. In order to counter this problem, we propose an energy aware security service selection method that saves energy by selecting only particular types of security service required by a given connection. In this paper, we compared the energy consumption of each communication to provide integrity, authentication, and confidentiality in Secure Sockets Layer/Transport Layer Security (SSL/TLS) with our proposed method. The experimental results demonstrate the validity of our proposed method. Our proposed method saved 54.94% energy for integrity and 74.52% for authentication.


Electronics ◽  
2021 ◽  
Vol 10 (21) ◽  
pp. 2598
Author(s):  
Hussah Talal ◽  
Rachid Zagrouba

Technologically speaking, humanity lives in an age of evolution, prosperity, and great development, as a new generation of the Internet has emerged; it is the Internet of Things (IoT) which controls all aspects of lives, from the different devices of the home to the large industries. Despite the tremendous benefits offered by IoT, still there are some challenges regarding privacy and information security. The traditional techniques used in Malware Anomaly Detection Systems (MADS) could not give us as robust protection as we need in IoT environments. Therefore, it needed to be replaced with Deep Learning (DL) techniques to improve the MADS and provide the intelligence solutions to protect against malware, attacks, and intrusions, in order to preserve the privacy of users and increase their confidence in and dependence on IoT systems. This research presents a comprehensive study on security solutions in IoT applications, Intrusion Detection Systems (IDS), Malware Detection Systems (MDS), and the role of artificial intelligent (AI) in improving security in IoT.


2020 ◽  
Vol 10 (4) ◽  
pp. 145-159
Author(s):  
Navod Neranjan Thilakarathne ◽  
Mohan Krishna Kagita ◽  
Dr. Thippa Reddy Gadekallu

Sign in / Sign up

Export Citation Format

Share Document