You are on page 1of 19

BMS COLLEGE OF ENGINEERING

(Autonomous College under VTU)


Bull Temple Road, Basavanagudi, Bangalore - 560019

A report on

Seminar Based on Summer/Winter Internship


“DATA SECURITY IN IOT”

Submitted in partial fulfillment of the requirements for the award of degree


BACHELOR OF ENGINEERING
IN
INFORMATION SCIENCE AND ENGINEERING
By

DEEKSHA JAIN (1BM19IS047)


ADITYA BHARDWAJ (1BM19IS006)
AKASH TIWARI(1BM19IS014)

Under the guidance of


Mrs. Sindhu K
Assistant Professor

Department of Information Science and Engineering


2020-21
BMS COLLEGE OF ENGINEERING
(Autonomous College under VTU)
Bull Temple Road, Basavanagudi, Bangalore – 560019

CERTIFICATE

Certified that the Technical Seminar has been successfully presented at BMS College of Engineering
by DEEKSHA JAIN , ADITYA BHARDWAJ , AKASH TIWARI bearing
USN:1BM19IS047,1BM19IS006,1BM19IS014 in partial fulfilment of the requirements for the IV
Semester degree in Bachelor of Engineering in Information Science & Engineering of
Visvesvaraya Technological University, Belgaum as a part of for the course Seminar Based on
Summer/Winter Internship Course Code - 19IS4SRSMI during academic year 2020-2021

Faculty Name: Mrs. Sindhu K

Designation: Assistant Professor

Signature:

.
Abstract

This project aims to describe the Internet of Things (IoT) has already become an essential
part of our daily lives, from mobile phones connected to fitness bands and software
applications (apps) controlling the household appliances. Everyday objects like cameras,
smart watches, home automation systems, and smartphones are connected to the Internet for
sending and receiving data build an IoT network. The advent of IoT in our day-to-day lives
has induced variety and volume of data to be present in the shared space. Notwithstanding the
advantages of IoT, it also presents a range of potential security risks. Additionally, the
traditional IT security models are unable to cope up with the diverse nature of “things” in the
IoT. Enterprises are also looking for strategies to meet ever-increasing demands for dynamic,
scalable, and adaptive security requirements of IoT. This chapter provides recommendations
for leveraging the benefits of traditional secure data handling in the IoT networks with a
flavour of dynamism and scalability. Analysing the current security challenges and
constraints posed by the IoT devices, illustration of how devices interchange the sensitive
information securely is also provided. 
Introduction

This project introduced The Internet of Things, or IoT which refers to the billions of physical
devices around the world that are now connected to the internet, all collecting and sharing
data. Super-cheap computer chips and the ubiquity of wireless networks, it's possible to turn
anything, from something as small as a pill to something as big as an aeroplane, into a part of
the IoT. Connecting up all these different objects and adding sensors to them adds a level of
digital intelligence to devices that would be otherwise dumb, enabling them to communicate
real-time data without involving a human being. The Internet of Things is making the fabric
of the world around us smarter and more responsive, merging the digital and physical
universes.

IoT security is the technology segment focused on safeguarding connected devices and
networks in the internet of things (IoT). IoT involves adding internet connectivity to a system
of interrelated computing devices, mechanical and digital machines, objects, animals and/or
people. Each "thing" is provided a unique identifier and the ability to automatically transfer
data over a network. Allowing devices to connect to the internet opens them up to a number
of serious vulnerabilities if they are not properly protected.

Connectivity issues or the need for end-users to manually download updates directly from a
C&C center often result in devices running on outdated software, leaving them open to newly
discovered security vulnerabilities.

The data we get from IoT and the services we provide using this data lives on the cloud, and
users and stakeholders can access this data from anywhere and from any device. A well-
executed IoT project uses the internet enabled device to transmit real-time data to a central
server, uses algorithms to process this information and then take automated decisions to
change the way the end-device works.

APIs are commonly targeted by a variety of threats, including Man in the Middle (MITM),
code injections (e.g., SQLI), and distributed denial of service (DDoS) assaults. More

information about the implications of API-targeting attacks can be found here.


Literature Survey

Sollins, K.R. [1] discussed about the struggle in the collection, use and management of Big
Data at the intersection of security and privacy requirements and the demand of innovative
uses of the data. This problem is overstated in the context of the Internet of Things (IoT).
Innovation and the use of big data is often the cause of improved products, services and
societal capabilities. IOT system or application is consists of a number of elements of
different sorts, perhaps operated and controlled by different parties, with possibly differing
policies and management practices. It provides security and privacy in support of both data
and its management. It has also been discussed about how Internet of Things (IOT) exist in
technology and system design.

There are many challenges associated with IOT devices like they do not have the capacity
with respect to either onboard capabilities for storage and computation or bandwidth to
provide the required security mechanisms, such as key exchange and encryption. Therefore,
the problem that the full extent of end-to-end authentication and encryption cannot occur.
Data security and privacy are problematic but has led to innovation with respect to data. Data
analytics, machine learning, and deep learning are fixated on extracting inferences from data
and not directly observable or recognizable.

IoT Big Data security and privacy and the demand for innovation can be undertook more
efficiently by seeing the policy limitations, financial and commercial drivers, and technology
opportunities and restraints first independently and then in combination will increase the
probability of success on both sides of the problem we face.

Garg, H. et al. [2] discussed about Internet of Things (IoT). It is an honestly disruptive
technology with unthinkable growth, impact, and capability. The role of REST API in the IoT
Systems and some initial ideas of IoT, technology is able to record and count everything. The
Internet of Things connects computer devices integrated in everyday objects through the
Internet, allowing us to transfer data. The advantages are, we can empower our computers to
gather information about surroundings without depending on humans and by processing the
information collected we can reduce indulgence, loss, and cost. The Internet of Things allows
for interaction between the physical world and the digital world.
IoT applications have become an essential part of personal lives and data collected is rather
sensitive and private to an individual. So, the, Privacy and Security issues must be addressed
in all of these environments. As in the health sector, health data is highly critical for personal
privacy, therefore it should not be accessed by an unauthorized entity. IoT gateway is
provided which acts as an intermediate between IoT devices and middleware. Gateways are
also allowed to call REST API and exchange all information firmly. REST API is used for
communication and data exchange. Middleware successfully assists IoT growth by revealing
REST API and providing an interface to the user to register their IoT devices and then
securely reading data composed by the device.

Roukounaki, A. et al. [3] discusses a scalable and configurable data collection infrastructure
for data-driven IoT security. It highlights the collection of (security) data from different
elements of IoT systems, including individual devices and smart objects, IoT platforms, and
entire clouds. The scalability of the presented infrastructure helps in the integration of state-
of-the-art technologies for large scale data collection, streaming and storage, while its
configurability depends on an extensive approach to modelling security data from a variety of
IoT systems and devices.

Architecture for data-driven IOT security includes discusses about the different layers which
includes variety like: Iot Systems Layer, Data collection and Actuation Layer, Security
Intelligence, Security Services (SECaaS), Security Use Cases.
Nowadays for securing IOT systems Machine learning and deep learning approaches are
increasingly working. These approaches require collection and management of very large
amounts of security data for training and building supervised and unsupervised learning
systems that must be efficient a. It is therefore important to build extensible, scalable and
well-designed infrastructures for collecting security data from all the different elements that
comprise nontrivial systems including devices, and cloud computing infrastructures.

Hassija, V. et al. [4] discussed that how the Internet of Things (IoT) is the subsequent
generation of communication. Using the IoT, bodily gadgets may be empowered to create,
receive, and trade facts in a continuing manner. Various IoT programs recognition on
automating extraordinary obligations and are looking to empower the inanimate bodily
gadgets to behave without any human intervention. The current and upcoming IoT programs
are exceedingly promising to boom the stage of comfort, efficiency, and automation for the
users. It is vital to make the desired adjustments withinside the structure of the IoT programs
for attaining end-to-end stable IoT environments. Also discussed in depth evaluation of the
safety-associated demanding situations and reasserts of danger withinside the IoT programs is
presented. After discussing the safety issues, diverse rising and current technology targeted
on attaining a excessive diploma of consider withinside the IoT programs are discussed. Four
extraordinary technology, blockchain, fog computing, area computing, and gadget learning,
to boom the extent of safety in IoT are discussed.

Also discussed the troubles associated with the sensing layer, community layer, middleware
layer, gateways, and alertness layer. Also mentioned the prevailing and upcoming answers to
IoT protection threats which includes blockchain, fog computing, facet computing, and
device learning. The present day of IoT protection has additionally been mentioned.

Aydos, M. et al. [5] has discussed that Internet of Things is the next-generation Internet
network created by intelligent objects with sensors and software, employed in a wide range of
fields such as textile, construction, health, education, transportation, automotive and
education. Internet of Things is the following-era Internet community created with the aid of
using wise items with software program and sensors, hired in an extensive variety of fields
consisting of automotive, construction, health, textile, schooling and transportation. With the
appearance of Industry 4.0, Internet of Things has been begun for use and it has caused the
emergence of innovative enterprise models. The processing and manufacturing talents of
Internet of Things items in hidden and important statistics offer notable benefits for the
following era of Internet. However, the incorporated capabilities of Internet of Things item’s
purpose vulnerabilities in phrases of safety, making them the goal of cyber threats. Also,
safety version which gives an incorporated risk-primarily based totally on Internet of Things.

IoT is the infrastructure of various smart objects that with an end-to-end integration with a
mixture of various systems. This answer is now no longer sufficient to make certain the
safety of the integrated shape of one of these various system

Amanullah, M.A. et al. [6] discusses the fast increase in rising technology such as, sensors,
smartphones, 5G communication, and digital truth ends in innovative programs such as,
linked industries, smart city, smart energy, linked automobiles, smart agriculture, linked
constructing complexes, linked fitness care, smart retail outlets, and smart supply chain,
which adversely make a contribution to the build-up of massive quantities of data. The
increasing population of IoT gadgets has contributed to the attention of security dangers
related to them. Additionally, IoT gadgets produce massive volume, velocity and type of
records. In this regard, deep learning has been widely accepted amongst organizations and
researchers due to their high ability to learn, accuracy, and minimal human supervision. Also,
huge records technology has additionally been of hobby because of their functionality in
processing massive quantities of records, in conjunction with their functionality to method
records in a number of environments.

Stergiou, C. et al. [7] discussed the hassle with privacy and security in ordinary lifestyles
may be solved or may be minimized by using Big Data (BD) services and analysis tools. Big
Data is a brand-new famous term, used to describe the incredibly fast boom in extent of
statistics in based and unstructured form. Accuracy in huge statistics can also additionally
cause greater assured choices making, and higher choices can bring about greater operational
efficiency, price reduction, and decreased risk. BD commonly makes use of Cloud
Computing (CC)as a base era with the intention to operate.

In addition to this, CC may be used as a base era for some other relative to communications
era, Internet of Things (IoT). The primary concept of the IoT is the diffuse presence of a
selection of matters or items utilized by human beings including radio-frequency identity
tags, sensors, actuators, and cellular phones. Through specific addressing schemes, these
items have interaction with every different and cooperate with different matters close to them
with the intention to attain the common goals. The IoT can be described as the community of
bodily items, devices, vehicles, homes and different objects which might be embedded with
electronics, software, sensors, and community connectivity, allowing those items to acquire
and interchange statistics.

Chong, I. et al. [8] discussed that human are widely incorporating Internet-enabled
technology into their normal lives. For example, smart fridges permit people to apply
smartphones to time table warm water to be dispensed, and a smart workplace constructing
can alter lighting fixtures and temperature to match worker’s preferences primarily received
from them or from sensors.

It also discusses the need to take a human factors method to privacy and security while
designing IoT devices. Also highlighted the significance of thinking about the human person
as another defence against cyberattacks. Work ought to cross from creating easy coding
patches to taking customers into consideration at the earliest design process. Designers and
developers need to recall who the customers are and the way they may be called to movement
while going through risk and privacy issues.

Bicaku, A. et al. [9] discussed about globalization and digitalization of modern frameworks,
standard consistence is acquiring consideration. To stay cutthroat and stay in business,
various areas inside industry are needed to consent to different guidelines. Consistence plans
to satisfy guidelines by including all actions forced by laws and principles. Each gadget,
application, or administration executes a few advances at numerous levels, and guidelines
support interoperability across them.

They help to make worldwide business sectors for enterprises and empower arranged
improvement to be effective and maintainable. This work features the significance of
standard consistence and nonstop check in mechanical Internet of Things and executes a
programmed observing and standard consistence check system. In this work, we centre on
security, wellbeing, and authoritative parts of mechanical Internet of Things. Also, various
guidelines and best practice rules, which are utilized to separate security, wellbeing, and
hierarchical quantifiable pointer focuses. Likewise, we present the model of the checking and
standard consistence check system used to show the security consistence of a mechanical
Internet of Things use case.

The digitalization of mechanical creation will bring new difficulties to the current assembling
frameworks. Regardless of this development, security, wellbeing, and organizational angles,
particularly consistence to existing standards. Also discussed about three main components in
order to build an automated compliance framework: (a) monitoring agents, (b) EGM module,
and (c) compliance module is identified.

Gao, Y. et al. [10] discussed about the enormous measure of information are being produce
by Internet-of-things sensor organizations and applications. All together to guarantee
information security for deduplication, diverse information ought to be allotted with various
protection levels. We propose a deduplication conspire dependent on edge dynamic change in
accordance with guarantee the security of information transferring and related operations.
The idea of the ideal edge is presented interestingly, which can be utilized to wipe out the
downsides of the fixed edge in conventional plans. The thing reaction hypothesis is received
to decide the affectability of different information and their security score, which guarantees
the relevance of information protection score. It can take care of the issue that a few clients
care minimal about the protection issue. We propose a protection score question and reaction
instrument dependent on information encryption. On this premise, the unique change strategy
for the ubiquity limit is intended for information transferring.

Trial results and examination show that the proposed conspire dependent on edge dynamic
change has nice scalability and practicability. IoT sensor networks based on threshold
dynamic adjustment. The concept of the ideal threshold is proposed for the first time, and the
IRT is applied. By uploading the user’s feedback on the data privacy level, the privacy score
can be dynamically adjusted, thereby calculating and adjusting the threshold of the
deduplication.

Mehta, M. et al. [11] discussed about how Internet of things is turning into the top
technology currently. By the usage of IOT, differing types of devices can interface, hyperlink
and talk facts with none interruption. IOT brings intelligence and automation in one-of-a-kind
regions like agriculture, transportation, industry, fitness and lot more. The end factor aim of
the IOT operations is to increase opulence and productivity of the stakeholders’ composition
consists of one-of-a-kind sensors and different matters which might be related to the web. As
Web is open architecture, it lay out beneficial floor to Intruders for appearing one-of-a-kind
varieties of protection threats. Security and Protection are the symbolic factor of view for
IOT system. IOT devices have hassle in phrases of garage and additionally computational
efficiency. So, current conventional procedures cannot be deployed at once into IOT
Network. Confidentiality, Integrity and Authentication are pillars for IOT Security. Among
them, Authentication carrier is top nature as it validates identification of devices into the
community. If Authentication technique isn't secured sufficient than adversary can benefit
community control and can also release numerous different varieties of assaults into the
community.

Without right protection; packages of IOT can't be benefit recognition and additionally
they're now no longer so lots useful. So, Security of IOT community is high studies direction
currently. In this article; we've supplied conceptual terminologies approximately IOT which
includes definition, architecture & demanding situations for protection in IOT system. Then
we mentioned related studies paintings which already has executed with the aid of using one-
of-a-kind studies pupils withinside the discipline of IOT protection. We have additionally
made comparative look at of a few current protection methods. After offering a comparative
evaluation of conventional authentication algorithms, we've identified a concrete studies hole
for green IOT machine authentication on which there may be a call for to paintings for
boosting protection service for IOT

Lu, Y. et al. [12] discussed about the arising innovation and, truly, an upheaval, the Internet
of Things (IoT) has brought gigantic changes to end clients in their everyday lives. For
people, their living, examining, and working are completely associated with the IoT
organization, exploiting brilliant conditions (home and city), eHealth, and transportation
frameworks. For organizations developments like progressed computerization and
mechanical assembling, information sharing information and self-changing systems and
frameworks are increasingly well known.

The IoT has dramatically changed the entire world and our daily lives. Cybersecurity
guarantees that IoT will become a secure network for processes, software/hardware, things
and people. If so, IoT will offer the world a higher level of accessibility, integrity,
availability, scalability, confidentiality, and interoperability. At the same time, cybersecurity
issues will be one of the primary tasks of IoT in the coming years.

Garg, S. et al. [13] discussed about Data Clustering is quite possibly the most significant
segments of information investigation, and assumes a significant part in different Internet of
Things (IoT)- empowered applications such as-Industrial IoT, Smart Grids, Connected
Vehicles, and so forth Density Based Spatial Clustering of Applications with Noise
(DBSCAN) is one such grouping procedure which is broadly used to distinguish
abnormalities in enormous scope information.

This in turn has led to the evolution of limitless applications of IoT ranging from smart cities,
smart homes, e-healthcare, smart grids, Internet of Vehicles (IoV), Industrial IoT (IIoT) etc.
The information generated from these application domains is essentially humongous and
heterogeneous in nature; which requires powerful data processing, storage and analysis to
build smart systems and derive the best potential use of IoT.

Likewise, the measure of information being delivered ordinary has expanded from terabytes
to petabytes from different IoT-empowered sensors, actuators, and gadgets. These articles are
the biggest wellsprings of data stream across the 15 Internet. In a nutshell, it tends to be
inferred that, in this time of in-stream information and IoT, there is no restriction on the
measure of information coming from shifted sources. In addition, the intricacy of the
information and the measure of commotion related with it isn't predefined. Indeed, even a
minor security hazard can trigger significant difficulties going from network blockage and 20
downtime issues to extreme information and monetary losses.

Yousuf, O. et al. [14] discussed about how Internet of Things (IoT) is a promising and
challenging system concept and requires new types of architectures and protocols compared
to traditional networks. Security is a very serious issue for IoT that needs to be addressed
proficiently. Heterogeneity being an inherent characteristic of IoT gives rise to many security
issues that need to be addressed from the viewpoint of new architectures such as software
defined networking, cryptographic algorithms, federated cloud and edge computing.

It also includes Data management challenge, Data mining challenge, Security challenge,
Privacy challenge, Chaos challenge.

The various types of attacks that occur at the three layers of IoT security protocol stack –
perception, networking and application layers – is explained in detail along with the possible
solutions that can be immediately applied at each layer. Furthermore, the countermeasures at
each layer along with the prospective advantages and disadvantages are proposed so that the
researchers can get a clue in implementing the particular strategy.

Shao, G.N. et al. [15] discussed about The Internet of things (IoT) has modified the sector in
many components of our living. IoT-enabled packages which includes healthcare and energy
have already stepped into smart living, bringing a whole lot of blessings consisting of
automation, efficiency, and low cost. Unfortunately, such packages are forming isolated
records with sufficient cross-utility verbal exchange and inter-cloud collaboration. With
sizable benefits of low latency, situational awareness, low cost, mobility support, and sizeable
coverage, cloud computing enables verbal exchange and collaboration among universal and
global things. However, sizeable cyberthreats discourage human beings from in addition
adoption of IoT gadgets in smart living. The cutting-edge mixture of cloud and IoT is a
gamechanger generation that addresses many problems, although it’s far related to full-size
protection deficiencies.

Without mature rules withinside the IoT market, profit-driven providers frequently prioritize
capability over protection in designing a product to shop time and money. We show the
advantages of computing intelligence moves closer to records handling complex offerings
performed historically in a cloud. Compared with a centralized cloud version requiring a
massive extent of records despatched to and processed on a faraway server, our scheme
leverages cloud computing and microservices, extending the intelligence of protection
computation to manage records with situational awareness. Evaluation effects show the
advantages of inclusive of protection, low latency, and high scalability. More interestingly,
withinside the implementation of our protocols, computation-in depth workloads along with
key technology are accomplished in fog, whilst resource-constrained gadgets simplest want to
carry out low-value computation. We check out the Parent-Child affinity as a precious enter
toward end-to-end protection. Meanwhile, protocol reviews verify the effectiveness of anti-
famous attacks. Our scheme is greater appropriate to resource-restrained entities in smart
living and different comparable environments, grounded in advantages along with
performance and effectiveness without computation-in depth workload necessities at the
consumer side.
Conclusion

An IoT device contains vast amounts of data, much of which is unique to its individual users,
including online browsing/purchase records, credit card details and personal health
information.

An improperly secured device leaves this data vulnerable to theft. What’s more, vulnerable
devices can be used as gateways to other areas of the network they are deployed on, allowing
for more sensitive data to be extracted.

Manufacturers often release IoT devices (e.g., home routers) containing easily decipherable
passwords, which might be left in place by vendors and end-users. When left open to remote
access, these devices become easy prey for attackers running automated scripts for bulk
exploitation.

It does not activate or trigger any succeeding action.  Using IoT in this manner is the most
basic level of implementation and a very good analogy is the electricity meter that power
companies use.  It exists to take note of how much electricity you are consuming, but it does
not alert you when you have used a certain amount of electricity. Such measurement-only IoT
devices are increasingly being used by governments to measure and transmit real-time data
from streetlights, traffic cameras and other deployments to a central system. 

Automation is when you use IoT devices not just to record data but to also execute automated
business processes.  In this level, businesses must first decide what part of their operation,
system or process need the aggregated data and then identify how to process and use this
information.  For instance, going back to the power meter analogy, an example for IoT with
automation would be for the meter to send an automated SMS alert to consumers with details
regarding their energy consumption.

A beautiful thing about IoT is that it lends itself to innovation quite easily.  Manufacturers
can integrate IoT into their products and can make them more attractive to buyers.  The
essential thing here is for the business to collaborate with third party hardware and software
makers in the IoT deployment process. 
References

[1]

Sollins, K.R., 2019. IoT big data security and privacy versus innovation. IEEE Internet of
Things Journal, 6(2), pp.1628-1635.

Link: IoT Big Data Security and Privacy Versus Innovation | IEEE Journals & Magazine |
IEEE Xplore

[2]

Garg, H. and Dave, M., 2019, April. Securing iot devices and securelyconnecting the dots
using rest api and middleware. In 2019 4th International Conference on Internet of Things:
Smart Innovation and Usages (IoT-SIU) (pp. 1-6). IEEE.

Link: Securing IoT Devices and SecurelyConnecting the Dots Using REST API and
Middleware | IEEE Conference Publication | IEEE Xplore

[3]

Roukounaki, A., Efremidis, S., Soldatos, J., Neises, J., Walloschke, T. and Kefalakis, N.,
2019, June. Scalable and configurable end-to-end collection and analysis of IoT security data:
Towards end-to-end security in IoT systems. In 2019 Global IoT Summit (GIoTS) (pp. 1-6).
IEEE.

Link: Scalable and Configurable End-to-End Collection and Analysis of IoT Security Data :
Towards End-to-End Security in IoT Systems | IEEE Conference Publication | IEEE Xplore

[4]

Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P. and Sikdar, B., 2019. A survey on IoT
security: application areas, security threats, and solution architectures. IEEE Access, 7,
pp.82721-82743.
Link: A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures
| IEEE Journals & Magazine | IEEE Xplore

[5]
Aydos, M., Vural, Y. and Tekerek, A., 2019. Assessing risks and threats with layered approach
to Internet of Things security. Measurement and Control, 52(5-6), pp.338-353.

Link: Assessing risks and threats with layered approach to Internet of Things security - Murat
Aydos, Yılmaz Vural, Adem Tekerek, 2019 (sagepub.com)

[6]
Amanullah, M.A., Habeeb, R.A.A., Nasaruddin, F.H., Gani, A., Ahmed, E., Nainar, A.S.M.,
Akim, N.M. and Imran, M., 2020. Deep learning and big data technologies for IoT
security. Computer Communications, 151, pp.495-517.
Link: Deep learning and big data technologies for IoT security - ScienceDirect

[7]
Stergiou, C., Psannis, K.E., Gupta, B.B. and Ishibashi, Y., 2018. Security, privacy & efficiency
of sustainable cloud computing for big data & IoT. Sustainable Computing: Informatics and
Systems, 19, pp.174-184.

Link: Security, privacy & efficiency of sustainable Cloud Computing for Big Data & IoT -
ScienceDirect

[8]
Chong, I., Xiong, A. and Proctor, R.W., 2019. Human factors in the privacy and security of the
internet of things. Ergonomics in Design, 27(3), pp.5-10.
Link: Human Factors in the Privacy and Security of the Internet of Things - Isis Chong, Aiping
Xiong, Robert W. Proctor, 2019 (sagepub.com)

[9]
Bicaku, A., Tauber, M. and Delsing, J., 2020. Security standard compliance and continuous
verification for Industrial Internet of Things. International Journal of Distributed Sensor
Networks, 16(6), p.1550147720922731.
Link: Security standard compliance and continuous verification for Industrial Internet of Things
- Ani Bicaku, Markus Tauber, Jerker Delsing, 2020 (sagepub.com)

[10]

Gao, Y., Xian, H. and Yu, A., 2020. Secure data deduplication for Internet-of-things sensor
networks based on threshold dynamic adjustment. International Journal of Distributed Sensor
Networks, 16(3), p.1550147720911003.

Link: Secure data deduplication for Internet-of-things sensor networks based on threshold
dynamic adjustment - Yuan Gao, Hequn Xian, Aimin Yu, 2020 (sagepub.com)

[11]

Mehta, M. and Patel, K., 2020. A review for IOT authentication–Current research trends and
open challenges. Materials Today: Proceedings.

Link: A review for IOT authentication – Current research trends and open challenges -
ScienceDirect

[12]

Lu, Y. and Da Xu, L., 2018. Internet of Things (IoT) cybersecurity research: A review of current
research topics. IEEE Internet of Things Journal, 6(2), pp.2103-2115.

Link: Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics |
IEEE Journals & Magazine | IEEE Xplore

[13]

Garg, S., Kaur, K., Batra, S., Kaddoum, G., Kumar, N. and Boukerche, A., 2020. A multi-stage
anomaly detection scheme for augmenting the security in IoT-enabled applications. Future
Generation Computer Systems, 104, pp.105-118.

Link: A multi-stage anomaly detection scheme for augmenting the security in IoT-enabled
applications - ScienceDirect

[14]

Yousuf, O. and Mir, R.N., 2019. A survey on the Internet of Things security. Information &
Computer Security.

Link: A survey on the Internet of Things security: State-of-art, architecture, issues and
countermeasures | Emerald Insight

[15]

Shao, G.N., Kim, H. and Imran, S.M., 2016. https://www. sciencedirect.


com/science/article/abs/pii/S092633731500346X.

Link: A fast and scalable authentication scheme in IOT for smart living - ScienceDirect

You might also like