Article Fingerprint
ReserarchID
CSTNWSA1E58
The world is undergoing a dramatic rapid transformation from isolated systems to ubiquitous Internet-based-enabled ‘things’ capable of interacting each other and generating data that can be analyzed to extract valuable information. This highly interconnected global network structure known as Internet of Things will enrich everyone’s life, increase business productivity, improve government efficiency, and the list just goes on. However, this new reality (IoT) built on the basis of Internet, contains new kind of challenges from a security and privacy perspective. Traditional security primitives cannot be directly applied to IoT technologies due to the different standards and communication stacks involved.
Muhammad A Iqbal. 2017. \u201cA Review on Internet of Things (IoT): Security and Privacy Requirements and the Solution Approaches\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 16 (GJCST Volume 16 Issue E7): .
Crossref Journal DOI 10.17406/gjcst
Print ISSN 0975-4350
e-ISSN 0975-4172
Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.
Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.
Total Score: 103
Country: Unknown
Subject: Global Journal of Computer Science and Technology - E: Network, Web & Security
Authors: Muhammad A. Iqbal, Oladiran G. Olaleye, Magdy A. Bayoumi (PhD/Dr. count: 0)
View Count (all-time): 281
Total Views (Real + Logic): 7219
Total Downloads (simulated): 1782
Publish Date: 2017 01, Tue
Monthly Totals (Real + Logic):
This paper attempted to assess the attitudes of students in
Advances in technology have created the potential for a new
Inclusion has become a priority on the global educational agenda,
The world is undergoing a dramatic rapid transformation from isolated systems to ubiquitous Internet-based-enabled ‘things’ capable of interacting each other and generating data that can be analyzed to extract valuable information. This highly interconnected global network structure known as Internet of Things will enrich everyone’s life, increase business productivity, improve government efficiency, and the list just goes on. However, this new reality (IoT) built on the basis of Internet, contains new kind of challenges from a security and privacy perspective. Traditional security primitives cannot be directly applied to IoT technologies due to the different standards and communication stacks involved.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.