Security Solution for the IOT Devices

α
Dr. G V N K V Subbarao
Dr. G V N K V Subbarao
α Jawaharlal Nehru Technological University, Hyderabad

Send Message

To: Author

Security Solution for the IOT Devices

Article Fingerprint

ReserarchID

8KYXH

Security Solution for the IOT Devices Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

As the internet is available widely with low cost to connect with the devices day by day. Almost all electronic devices are coming to the market with wi-fi capabilities and sensors built into them, even technology costs also coming down. All of these devices are forming Network by accessing the internet through their wi-fi capabilities. These are creating a perfect IOT storm like smart phones are becoming rocks and penetrating everywhere so the sky is the limit for them. As these all are in the hands of everybody, there is obviously security threats. In this paper, all the possible threats are addressing with possible solutions occurring in these IoT devices. Suggested the Homomorphic Encryption scheme for security in IoT devices.

References

19 Cites in Article
  1. A Wood,J Stankovic (2002). Denial of service in sensor networks.
  2. Mohamed Ferrag,Leandros Maglaras,Helge Janicke,Jianmin Jiang,Lei Shu (2016). Authentication Protocols for Internet of Things: A Comprehensive Survey.
  3. Tobias Heer,Oscar Garcia-Morchon,René Hummen,Sye Keoh,Sandeep Kumar,Klaus Wehrle (2011). Security Challenges in the IP-based Internet of Things.
  4. (2009). Current research on Internet of Things (IoT) security: A survey 7. Akbar Abbasi "Desirable Security for WSN.
  5. A Menezes,D Johnson (1998). EC-DSA: An Enhanced DSA.
  6. Alice Silverberg (2013). Fully Homomorphic Encryption for Mathematicians.
  7. (2011). How to Protect iot Systems and Devices IoT security features vary depending on specific IoT application and place in the IoT ecosystem.
  8. Caroline Fontaine,Fabien Galand (2007). A Survey of Homomorphic Encryption for Nonspecialists.
  9. C Negus (2006). Linux Bible: Boot Up to Fedora, KNOPPIX, Debian.
  10. C Orlandi,A Piva,M Barni (2007). Oblivious Neural Network Computing via Homomorphic Encryption.
  11. C Shannon (1949). Communication Theory of Secrecy Systems*.
  12. Carlos De Morais Cordeiro,Dharma Agrawal (2011). Ad Hoc and Sensor Networks.
  13. Certicom Corp (2000). Remarks on the Security of the ECC systems.
  14. Cherita Corbett,Raheem Beyah,Janise Mcnair (2011). Computer and Network Security Volume 3 Security in Ad Hoc and Sensor Networks.
  15. D Integrity,P Sakarindr,N Ansari (2007). Security Services IN Group Communications OVER Wireless 22. Infrastructure, Mobile Ad.
  16. D Micciancio,O Regev (2008). Post-Quantum Cryptography, chapter Lattice-based Cryptography.
  17. Alessandro Sorniotti,Laurent Gomez,Konrad Wrona,Lorenzo Odorico (2007). Secure and Trusted in-network Data Processing in Wireless Sensor Networks: a Survey.
  18. Bart Goethals,Sven Laur,Helger Lipmaa,Taneli Mielikäinen (2011). On Private Scalar Product Computation for Privacy-Preserving Data Mining.
  19. Brett Hemenway,Rafail Ostrovsky (2012). On Homomorphic Encryption and Chosen-Ciphertext Security.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Dr. G V N K V Subbarao. 2019. \u201cSecurity Solution for the IOT Devices\u201d. Global Journal of Computer Science and Technology - A: Hardware & Computation GJCST-A Volume 19 (GJCST Volume 19 Issue A1): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
GJCST-A Classification: K.6.5
Version of record

v1.2

Issue date

September 17, 2019

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 5248
Total Downloads: 1370
2026 Trends
Related Research

Published Article

As the internet is available widely with low cost to connect with the devices day by day. Almost all electronic devices are coming to the market with wi-fi capabilities and sensors built into them, even technology costs also coming down. All of these devices are forming Network by accessing the internet through their wi-fi capabilities. These are creating a perfect IOT storm like smart phones are becoming rocks and penetrating everywhere so the sky is the limit for them. As these all are in the hands of everybody, there is obviously security threats. In this paper, all the possible threats are addressing with possible solutions occurring in these IoT devices. Suggested the Homomorphic Encryption scheme for security in IoT devices.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Security Solution for the IOT Devices

Dr. G V N K V Subbarao
Dr. G V N K V Subbarao Jawaharlal Nehru Technological University, Hyderabad

Research Journals