1 s2.0 S2214785321051543 Main

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/353611537

Study of security issues and solutions in Internet of Things (IoT)

Article  in  Materials Today: Proceedings · July 2021


DOI: 10.1016/j.matpr.2021.07.295

CITATIONS READS

6 1,599

4 authors, including:

Thirupathi Lingala Srikanth Renikunta


Stanley College of Engineering and Technology for Women Methodist College of Engineering and Technology
10 PUBLICATIONS   25 CITATIONS    3 PUBLICATIONS   6 CITATIONS   

SEE PROFILE SEE PROFILE

Rekha Gangula
Kakatiya Institute of Technology and Science
13 PUBLICATIONS   22 CITATIONS   

SEE PROFILE

All content following this page was uploaded by Rekha Gangula on 19 August 2021.

The user has requested enhancement of the downloaded file.


Materials Today: Proceedings xxx (xxxx) xxx

Contents lists available at ScienceDirect

Materials Today: Proceedings


journal homepage: www.elsevier.com/locate/matpr

Study of security issues and solutions in Internet of Things (IoT)


Shashi Rekha a,⇑, Lingala Thirupathi b, Srikanth Renikunta c, Rekha Gangula d
a
CSE Department, SR International Institute of Technology, Rangareddy 501301, Telangana, India
b
CSE Department, Methodist College of Engineering & Technology, Abids, Hyderabad 500001, Telangana, India
c
CIVIL Engineering Department, Methodist College of Engineering & Technology, Abids, Hyderabad 500001, Telangana, India
d
Department of CSE, Kakatiya Institute of Technology &Science, Warangal, Telangana, India

a r t i c l e i n f o a b s t r a c t

Article history: As smart devices are increasingly getting deployed in distinct scenarios it is important to examine how
Available online xxxx the various demands of these practical uses will affect the dynamics of protection. This study provides an
outline of the connection among the various security threats, specifications, implementations, and net-
Keywords: work safety as well as an overview. In addition, a few of the device communication services are often
Internet of Things(IoT) overviewed, evaluating the protection mechanisms. The Internet of Things (IoT) has been a focal point
Security in the previous few years. On analysis, here are several kinds of problems and difficulties with the
Solutions
tremendous ability of the IoT. For IoT technologies, applications, and networks, cybersecurity is one of
Data access
the crucial challenges. This study discusses the work advancement of IoT to examine every main part
of IoT, and finds how some safety problems and concerns have to be recognized and discusses them
momentarily. To secure information privacy, professional conduct, honesty, encryption, intrusion detec-
tion, and capability to recognize as well as versatility, interoperability, and usability, reliable and usable
IoT protection is needed to be brought into account. In terms of certain realities, new IoT approaches from
the scientific, educational and industrial sectors are presented and addressed by analyzing a few of the
current study in the IoT field Depending on the results of this report, it is important to develop and imple-
ment suitable IoT applications that can ensure integrity, security, and honesty in interconnected
conditions.
Ó 2021 Elsevier Ltd. All rights reserved.
Selection and peer-review under responsibility of the scientific committee of the International Confer-
ence on Nanoelectronics, Nanophotonics, Nanomaterials, Nanobioscience & Nanotechnology.

1. Introduction critical goal. It highlights the question how safety concerns are
always used latter in the development and debugging process in
The internet of things changes the method data from the actual several recent equipment implementations and occasions of IoT
world is accessed. The infrastructure of smart appliances consists layout. Security specifications may finish up getting introduced
of thousands to millions of small sensor networks with specific by recognizing access to production and perhaps other develop-
computing and networking capabilities to detect the environment. ment requirements
These instruments can provide extremely reliable and resolved In recent decades wireless sensor networks (WSN) have grown
information about the sensed phenomenon when they are net- from an enticing area of science to a practical technology for differ-
worked together. There are some problems involved in the process ent domains (e.g., industrial monitoring in critical infrastructures
of incorporating. [1]). Cybersecurity for wireless communications has also pro-
gressed, providing significant improvement, such as successful
public key authentication method iterations and compact self-
1.1. Definition of security
healing processes. There is still one specific aspect of the protection
of the sensor network that is usually underestimated or ignored:
Security by nature is a technique that assures that protection so
the interaction between the safety specifications the app’s func-
much as levels of consumer development and implementation is a
tionality and scope, and the network security. Even so, a given
application’s interpretation and specifications have a significant
⇑ Corresponding author.
effect on the protection measures that is being used to secure
E-mail address: shashirekha_cse@sriit.ac.in (S. Rekha).

https://doi.org/10.1016/j.matpr.2021.07.295
2214-7853/Ó 2021 Elsevier Ltd. All rights reserved.
Selection and peer-review under responsibility of the scientific committee of the International Conference on Nanoelectronics, Nanophotonics, Nanomaterials,
Nanobioscience & Nanotechnology.

Please cite this article as: S. Rekha, L. Thirupathi, S. Renikunta et al., Study of security issues and solutions in Internet of Things (IoT), Materials Today:
Proceedings, https://doi.org/10.1016/j.matpr.2021.07.295
S. Rekha, L. Thirupathi, S. Renikunta et al. Materials Today: Proceedings xxx (xxxx) xxx

the network. In addition, new WSN standards are being estab- Table 1
lished, however some security challenges seem to be ignored, since Built Internet of Things units relying on classification per million.

these guidelines primarily concentrate on maintaining connectiv- Classification Year 2012 Year-2015 Year-2017 Year-2020
ity among networks. This article is expected for two purposes. Automotive industry 96.0 187.6 362.3 3511.1
Our first aim is to provide an overview of the interaction among Consumer industry 1742.1 2234.5 2864.9 13172.4
conditions, frameworks and authentication methods. We would General marketing 395.2 459.4 623.8 5158.5
then specifically describe that how various systems, software and Entrepreneur 688.7 736.5 1009.4 3164.4
marketing
system architectures impact the identification and system integra- Total 2922.0 3618.0 4860.4 25006.4
tion of safety services. Ultimately, we will provide an outline of the
state of the art of sensor cybersecurity methods, figuring out by
now security models and key challenges. As for our ultimate con-
venience, we intend to define the current specifications of the net- 2. Security Issues, challenges and considerations
work system and its data encryption. We will also include an
overview of these various requirements, concentrating on their In recent days IoT began to acquire significant traction as a
protection abilities. result of the growing increase of computer products. Protection,
A research performed by Hewlett Packard [3] discovered that nevertheless, retains one of the significant IoT issues [4] and the
there are significant limitations in 70% of all the most widely uti- primary question posed by various Internet - Of - things investors,
lized IoT products. Due to their architecture, IoT applications are and also retains the ability to delay its adoption [5]. It is then
responsive to safety risks owing to the unavailability of some of deemed a few of the big issues to be tackled in order to encourage
these safety measures such as unreliable networking media inade- IoT in the real world [6]. Security is an essential feature of an IoT
quate specification of encryption and permission. As a result, system and is connected to unique safety measures that are also
everybody, either individual people or businesses, would be a crucial necessity for a device to allow confidence and security
affected when IoT is accessible. In particular, the functionalization features [4]. IoT security is a field that focuses mostly on security
of domains offers different possibilities for impact and trade. This of smart apps the safety of information as well as the Digital revo-
adds to a number of new possible hazards that should be regarded lution networks [7]. The key guiding factors of IoT [8] are the soft-
with respect to data safety and information preservation. See ware technologies and sensor networks used in equipment
(Fig. 1). communication, smart devices solutions and mobile technology.
In particular specific machines and entire networks, inadequate
protection and bad encryption habits now have to be taken into
account again through beginning and safety planned. In various
places and technologies, billions of external interconnected sys-
tems indicate how this IoT environment had expanded the sophis-
tication of systems [9].Security problems are massively increased
because as amount of linked Smart devices constantly grows, so
most security concerns need to be taken into account as a whole
system [10]. In addition, as a result of their conventional protection
frameworks, IoT innovations will never be explicitly applied due to
the application architecture i.e., finite energy, or the vast adoption
of smart devices, raises problems of variability and scalability [4]. A
Fig 1. IoT would also combine these subsequent components. diverse variety of threats, including expected and irregular, may
endanger the survival and protection of these devices and, thus,
device flexibility will be a significant concern.
1.2. Security concerns in sensor networks Uniformity, including the protection measures which must be
built through the IoT, is among the more important problems yet
Security concerns and aspects can be remedied by presenting has a major effect on the application authorities which need to
engineers and programmers with sufficient guidance to incorpo- be incorporated in the IoT [6]. Restricted networks can communi-
rate safety approaches into IoT applications, thereby enabling con- cate whether indirectly or by access points among different dis-
sumers to use IoT authentication methods incorporated within the parate devices [16]. In order to resolve the difficulty of
devices [2]. Our reason for carrying out this analysis is because integrating successful applications and standards on all applica-
most of the earlier research concentrated exclusively on educa- tions in the IoT implementation domains complexity requires pro-
tional approaches and neglected other kinds of technological and tection [4].The main challenge is approaching optimization for a
commercial approaches. Even then, in effort to accomplish inte- broad scale IoT implementation. Providing effective approaches
grated services as well as all the requirements in those key cate- that are flexible for the billions of items connected to several speci-
gories, all three components should function cohesively and fic internal or external platforms is a major challenge [4], [18]. In
simultaneously. The Wireless Sensor and Actuator Network comparison, many of those are portable items but it would remain
(WSAN) is an application of the Wireless Sensor Network (WSN) a big challenge to the IoT network to locate the place and check the
and acts as an omnipresent framework with many evolving con- appropriate identification of a particular item [4], [19]. Conse-
cepts, including the Internet of Things (IoT), the Industrial IoT quently, the creation of appropriate strategies to obfuscate user
(IIoT), the Cyber Physical System (CPS) and the Tactile Internet. information promoting complexity and usability are essential
To transform the fourth industrial revolution, such technical devel- issues [20]. See (Fig. 2).
opments integrate processing, computation, and controlling Information security concerns is being categorized into four cat-
together with a few with digital networks and communication egories, referring towards a study [10] privacy, credibility, integ-
technology (ICT). The Industry intends to allow established compa- rity, and accessibility of information Through usage of encryption
nies smart enough to manufacture large goods with lower prices. steps will overcome such privacy concerns information security
See (Table 1). guarantees data safety against malicious individuals whereas
client authentication protects information consistency and consis-

2
S. Rekha, L. Thirupathi, S. Renikunta et al. Materials Today: Proceedings xxx (xxxx) xxx

Recognition represents the hazard of linking a (constant) iden-


tification with a person and details about him, including an email
and username or a nickname of some kind. The danger resides in
linking an identification to a particular anonymity, breaching the
background and triggering and encouraging certain risks as well.
For example, analyzing and monitoring people or the compilation
of various forms of information. In the pattern recognition
step at the downstream facilities, while vast quantities of informa-
tion are gathered in a centralized location within the reach includ-
ing its topic, the danger of classification is currently mostly
prominent.

3. Solutions to security of IoT


Fig 2. Some of the security challenges in IoT devices.
3.1. Building security in IoT development

Since we look at 21.4 million smart speakers in operation in


2020, this is a significant concern. The trend is only about to con-
tency. In addition, integrity ensures the accessibility points will tinue as at least 20 percent of Internet searching occurred using
only be accessed by approved individuals to prevent every unau- google assistant and 22 percent of US individuals have rendered
thorized connected device, and information quality ensures a transaction utilizing the connected Digital app. Since then, IoT
whether there is none limit on approved availability to the data- system developers often passed on protection to bring goods to
base assets, facilities and applications. consumers quicker. Yet security is a rising issue nowadays and
In addition, a greater proportion of apps and facilities for IoT consumers are highly worried regarding the organizations handle
becoming progressively impervious to threats or loss of informa- the sensitive data of people. The adoption of the GDPR act is one
tion Developed software is needed in many areas to protect the of the most critical events that have affected corporations and con-
IoT towards these threats. Assets including the identity, authenti- tinue to influence individuals today. It is a reasonable assumption
cation, unsolicited email and availability will be designed again because companies who do not incorporate protection to IoT apps
for preservation of data and networking. Rather specifically, the will experience the massive revolt in the upcoming. Fortunately,
main issues relevant to IoT security are encryption, privacy, and many remain indeed concerns, here are often a variety of solutions
information security. In creating a link among devices and which can introduce. Instead of incurring technological liability,
exchanging the list of secret keys by the network, security is nec- it’s safer and consider protection a feature of the production phase
essary to avoid information from being stolen. Most IoT privacy that allows potential improvements exceptionally hard. The phys-
concerns including such information security, malicious software ical nature of the IoT ensures here that harm might be done in the
deployment and DDoS-style attacks on IoT-enabled applications actual life as safety concerns occur. Attacks on public facilities are
can be resolved by modifying and expanding the current IT tech- possible alongside probable confidentiality breaches in private life-
nology mechanisms that is now in force. See (Fig. 3). styles. See (Fig. 4).

Fig 3. IOT security concerns.

3
S. Rekha, L. Thirupathi, S. Renikunta et al. Materials Today: Proceedings xxx (xxxx) xxx

Fig 4. Six IoT security concepts within the list.

3.2. Develop a security mindset or perhaps also adding communications to the channel is negligible
for even a computer. Methodologies including text encryption keys
The framework actually requires to mimic the current privacy block cipher mechanisms and digital signatures cryptography [7]
precautions while designing IoT apps. Nowadays because imple- being traditionally used to solve the issue.
menting security capabilities will cause uncertainties companies
has actually turned Sensor networks also to sector. They have
become an added expense as well. The concerns that emerge from
an information hack nevertheless, are even further damaging. 3.5. Hardware is key
As a technical executive, at a commercial level, you have to
build the attitude and community to relevant factors a core attri- Eventually, despite some necessary equipment in effect, the
bute from almost the beginning. It is by having mentality that cer- prior safety procedures will never sustainable. It’s not even specific
tain measures return to normal. A dedication to recruiting qualified users that control IoT systems. Individuals fund each development
technology expertise and building in the appropriate resources is of the government domain and huge equipment with corporations.
critical. Presently, by employing VPN technology organizations as well as
people may secure the information digitally however its nuanced
3.3. Authentication yet another, side, and many dimensions of IoT artifacts suggest dif-
ficulty which could not be addressed by VPN itself.
A significant consequence for Smart applications to enhance Indeed, that design is intended with last generations in the con-
protection is by implementing authorization functions Through text of general populace domain and significant market products,
verifying whether each authorized recipient and applications are and frequent technology upgrades really aren’t practicable as in
obtaining information it will deter unauthorized organizations electronic devices. Each solution will be identified with incorpora-
through breaching apps. Based upon the IoT unit, there are two tion of processors to build additional security that will be installed
stages at how it requires to get accomplished. in apps. While programmers would build customized software
Through creating secure credentials and two-factor verification, applications that generally accessible versions could never break
end-user validation is achieved. Users have to create a proper net- against, processors will provide greater protection. Moving beyond
work to provide certificates for the government service and Busi- that to develop the degree of encryption the processors would pro-
ness - to - business level equipment. vide, assigning an identifier to every processor towards any system
in which each is installed provides data security and transparency.
3.4. Encryption technology This will enable the protect your IoT computer through processor
to server by collaborating through the authentication framework.
The importance of Sensor networks resides in the assumption The main control region would be a safety function that contin-
where useful information is transmitted. It introduces a variety ues to give a massive amount of focus in Sensor nodes. Because of
of bugs within the exact moment. The information must pass effi- the scale, flexibility and control restrictions, WSNs also considered
ciently across the authorizing computer, the web, the database, in being exceptional throughout this trait. Utilizing some of the
and/or the computers and equipment obtaining it. An illustration several public-key procedures, historically, contributes to the con-
of the abuse of IoT applications and linked channels is shown in clusion of its main institution Security towards possible threats is
this report about the information of the visitors of a resort are typically gotten rid of through introducing a basic key architecture
breached in the fish tank by a thermometer. for every device. Even so, these are understood that neither system
Handle server and database-based protection through the assis- flexibility is given by a general key, and perform data keys are
tance of password authentication to prevent a potential assault as never a flexible solution. Through certain structured protections,
that. Although many companies nowadays that are designing securing each aspect of such an IoT implementation computers,
accessible authentication applications. It allows appropriate the access points and interfaces, as well as the cloud server and
because use accessible encryption software because you can still users-gives the strong security design for the system.
without doing the initial testing to ensure whether it functions The strategy enhances secure methodologies of detection,
This software is often developed and tested by data protection encryption, and exposure, permission managing and authentica-
practitioners from all over the globe, allowing it an important tool tion among all information once processed, whether in the com-
in protecting the information. puter, in a database or network server, when it might be in
IoT systems often operate through potentially unassertive wire- operation on the server or even on the path to the database. See
less networks in open or remote regions. Therefore, eavesdropping (Table 2).
4
S. Rekha, L. Thirupathi, S. Renikunta et al. Materials Today: Proceedings xxx (xxxx) xxx

Table 2 cycle which includes invaluable trade, sharing, offering as well as


List of some tools providing security for the emerging industrial IoT. disposal. Designers thus understand its criteria for resilient out-
Companytools Features comes which might obviously pose several issues. Many changes
Black Berry Security software services in the life cycle (like exchanging a smart object requires hidden
Cisco IoT security services and solutions information at a provisional phase to be attached). It is possible
AI platform Upcoming Cybersecurity Phase to untwist the hidden information and to follow the issues associ-
Dojo Bull Guard Protects IoT connected devices ated continuously utilizing the system. IoT Security development
guardian tool
Bit defender box Protects the entire homenetwork and IoT devices
maintenance systems should securely enable upgrades and con-
Secure shields Identification & reactions, approaches including duct these through wide scale system networks in order to prevent
international safety facilities time-consuming and expensive facilities in the domain.
Zing Box company Digital Virtualization protective with a cost-effective Mostly from viewpoint of IoT information and cyber features, it
mobile application
has examined threats and opportunities of IoT protection. The aim
Luma Company Wireless internet for the entire house. Privacy settings
including data security of the paper is to boost knowledge of this specific subject and to
Praetorian Analysis & evaluation programs for IoT defense demonstrate how security issue and the specific needs of wireless
DPI technology Secure clients of technology as well as organization communications, such as helping for self-healing frameworks that
Protection of web connected devices online marketing can reduce the impact of internal attacks, should also be taken into
& implementations with essential services
account by established guidelines. The objective of this review is to
Cipher block Through devices, interactive, supplier-neutral,
technology multinational projects raise understanding of it now relevant issue, and to demonstrate
IoT driving secure Internet of things regular compliance monitoring how the impact of internal threats can also be recognized by estab-
service lished norms. Firstly, we discuss security as a whole, how it has
Rack 911 Labs Internet to display IoT system protection and
been challenging the internet of things devices. Further we discuss
governance
Nano lock Hardware protection software, review and Existing about the regular units of devices installed in every sector of busi-
security management services ness. Finally, we look through the solutions for the security issues
Labs centrifuge Device network protection platform for Wi-Fi, QR and how to overcome at the first step without causing huge loss of
platform codes, power generation, etc. data as well as in terms of money.
Atonom Reliability analysis focused on Cryptocurrency to
To operate collectively for safe information, transfer electronic
secure internet of things
sensing. Nevertheless, unless the client just presents a necessary
content at the necessary period and rejects the majority of the
details the misuse of a client information can be completely pre-
 Detection, verification, and access controls enhance privacy yet
vented thus allowing the method quicker, more effective and low-
can ensure transparency and avoid illicit practices.
ering that against the security risks addressed with in document.
 The encryption process guarantees privacy, and reliability of
information making worthless lost information and avoiding
interference with information.
6. Conclusion

4. Organizing IoT devices’ protection development cycle The IoT is an innovative application that had already achieved
substantial strides in software optimization. Within industry, pro-
A comprehensive yet deep cyber protection approach becomes fessional fields, as well as for the users themselves, IoT has enor-
crucial to maintaining the development process of safety devices mous advantages. Including some realistic methods of doing so,
throughout the computer and network continuum to reduce the people have focused at the considerations how IoT system protec-
threat layer yet which has frequently ignored. Security is never tion will be enforced. Companies are now navigating a delicate bal-
another operation, instead an emerging feature including its IoT ance among improving stable IoT while rapidly moving IoT-based
environment which would help the development cycle of IoT products throughout the industry. As the application of Sensor net-
applications in: works increases with in context, it is not possible to disregard the
issue of protection. While an extended product-to-market period
 Using fresh appliances and reclamation those around, and increased costs are generated by implementing access control,
 Executing innovative products in the network, the solution - reliable information hacks - makes such safeguards
 Performing stable improvements to applications, quite within the endeavor Tech companies have to bring a trans-
 Enacting controlled primary authorizations, formation in thinking and drive to develop further protection con-
 Ensuring data massive system bases. trols to secure between their specific company’s information and
those of the government. Many latest frameworks and techniques
5. Discussion have enabled to integrate electronic and analog processes. To oper-
ate collectively for safe information, transfer electronic sensing.
Method involves of identification, passwords, and symbols is Nevertheless, unless the client just presents a necessary content
important for all such operations. Although sensor networks dis- at the necessary period and rejects the majority of the details the
close the hidden information during the modification of network misuse of a client information can be completely prevented thus
management in the development phase confidentiality is threat- allowing the method quicker, more effective and lowering that
ened. In regard to either the damaging photographs and recordings against the security risks addressed with in document.
which are currently shown on smartphones and many certain
modern apps such problem is found. Because life-cycle confiden-
tiality contra versions are mainly related to the data obtained, CRediT authorship contribution statement
which relies on the IoT method frame level. Sometimes still, the life
cycle of several client service items is planned to purchase the ser- Shashi Rekha: Conceptualization, Methodology, Data curation,
vice only. Validation. Lingala Thirupathi: Visualization, Supervision. Sri-
In an ongoing basis, the observations it has still never advanced. kanth Renikunta: Investigation. Rekha Gangula: Writing - origi-
Electronic devices will be attributed to a rather interactive life nal draft.
5
S. Rekha, L. Thirupathi, S. Renikunta et al. Materials Today: Proceedings xxx (xxxx) xxx

Declaration of Competing Interest [8] L. Thirupathi, G. Rekha, Future drifts and modern investigation testsin wireless
sensor networks, Intern. J. Advance Research Com. Sci. Management Studies 4
(8) (2016).
The authors declare that they have no known competing finan- [9] . Thirupathi, V.N.R. Padmanabhuni, Multi-level protection (Mlp) policy
cial interests or personal relationships that could have appeared implementation using graph database, Intern. J.Advanced Com. Sci. App.
(IJACSA) 12 (3) (2021), https://doi.org/10.14569/issn.2156-5570 10.14569/
to influence the work reported in this paper.
IJACSA.2021.0120350.
[10] P.V. Lingala Thirupathi, N. Rao, Developing a multilevel protection framework
References using EDF, Intern. J. Advanced Research Eng. Technol. (IJARET) 11 (10) (2020)
893–902.
[1] C.K. Dehury, P.K. Sahoo, Design and implementation of a novel service
management framework for IoT devices in cloud, J. Syst. Softw. 119 (2016) Further Reading
149–161.
[2] M. Alam, J. Rufino, J. Ferreira, S.H. Ahmed, N. Shah, Y. Chen, Orchestration of
[1] K. Jaiswal, S. Sobhanayak, B.K. Mohanta, D. Jena, IoT-cloud based framework for
microservices for iot using docker and edge computing, IEEE Commun. Mag. 56
patient’s data collection in smart healthcare system using raspberry-pi. In
(9) (2018) 118–123.
2017 International conference on electrical and computing technologies and
[3] S. Kiran, S.B. Sriramoju, A study on the applications of iot, Indian J. Public
applications (ICECTA), 2017, November, (pp. 1-4). IEEE.
Health Resear. Develop. 9 (11) (2018) 1173–1175.
[2] A. Celesti, D. Mulfari, M. Fazio, M. Villari, A. Puliafito, Exploring container
[4] S. Kiran, S.S. Kanumalli, K.V.S.S. Rama Krishna, N. Chandra, Internet of things
virtualization in IoT clouds. In 2016 IEEE International Conference on Smart
integrated smart agriculture for weather predictions and preventive
Computing (SMARTCOMP), 2016, May, (pp. 1-6). IEEE.
mechanism,MaterialsToday:Proceedings,2021,ISSN22147853,https://doi.org/
[3] S. Kiran, G. Gupta, Usage patterns of network connectivity and security
10.1016/j.matpr.2020.11.081.(http://www.sciencedirect.com/science/article/
perspectives in internet of things, Euro. J. Molecu. Clinical Medicine 6 (2019)
pii/S221478532038682X).
01.
[5] J. Gubbi, et al. Internet of Things (IoT) a vision, architectural elements, and
[4] S. Kiran, G. Gupta., Security and integrity aspects and approaches in internet of
future directions. Future Gener. Comput. Syst. 29(7), 1645–1660 (2013) 404 H.
things, J. Critical Reviews 5 (6) (2018) 23–27, https://doi.org/10.31838/
Aldowah et al.
jcr.05.06.04.
[6] A.J. Jara, V.P. Kafle, A.F. Skarmeta, Secure and scalable mobility management
[5] S. Kiran, U. Vijay Kumar, T. Mahesh Kumar, A review of machine learning
scheme for the Internet of Things integration in the future internet
algorithms on IoT applications, In 2020 International Conference on Smart
architecture, Int. J. Ad Hoc Ubiquitous Comput. 13 (3–4) (2013) 228–242.
Electronics and Communication (ICOSEC), pp. 330-334. IEEE, 2020.
[7] L. Thirupathi, V.N.R. Padmanabhuni, Protected framework to detect and
mitigate attacks, Intern. J. Snalytical Experimental Modal Analysis XII (VI)
(2020) 2335–2337.

View publication stats

You might also like