z-logo
open-access-imgOpen Access
A Comparative Study on Models and Techniques for Securing IoT Applications
Author(s) -
Abdullah Mohammed
Publication year - 2019
Publication title -
international journal of computer applications
Language(s) - English
Resource type - Journals
ISSN - 0975-8887
DOI - 10.5120/ijca2019918362
Subject(s) - computer science , internet of things , data science , computer security
With digitization continuing to enter all aspects of daily life, a growing number of devices and appliances are becoming ‘smart’ and digitally connected. As a result, a large range of IoT applications have been developed and released utilizing a variety of IoT frameworks. All frameworks of IoT environments are composed of a set of procedurals, rules and standards that allow easy implementation and deployment of the various IoT applications. Deploying and implementing these applications necessitates a range of mechanisms and procedurals of security and privacy to ensure proper working and avoid any threats that may occur. This paper introduces a survey of how to secure IoT frameworks through applying a comparative study on a set of basic security mechanisms applied by providing background about security mechanisms, in addition to advantages and disadvantages of each security technique in IoT applications domain.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom