Main Article Content
Abstract
In Today’s era of information data plays vital role in communication, Security has been a ponderous affair for the professionals in any field. Security is not about only protection of assets but privacy and authority to access in legitimate terms too. Cryptography provides the functionality that protects and secures the data through its encryption algorithms and authentication to its end users. IoT has been most attractive topic/area in recent era. Privacy and security is an inseparable part of this technology. Which could affect in multi fold, so, the paper majorly focuses on four major challenges involving Security, Privacy, Compatibility and Connectivity of IOT and apprehension of IoT with its provided solution of using cryptographic algorithms.
Article Details
© 2011-2019 Australian Journal of Wireless Technologies, Mobility and Security e-ISSN 2200-1883
References
[2] E. Bertino and W. Lafayette, “Data Security and Privacy in the IoT,” pp. 18–20, 2016.
[3] T. Borgohain, “Survey of Security and Privacy Issues of Internet of Things,” pp. 1–7.
[4] . J. H. Ziegeldorf, O. G. Morchon, and K. Wehrle, “Privacy in the Internet of Things: Threats and Challenges,” no. i.
[5] N. Aleisa and K. Renaud, “Privacy of the Internet of Things: A Systematic Literature Review (Extended Discussion),” pp. 1–10, 2004.
[6] C. Zou, E. Engineers, and Z. Caufeng, “Security in the Internet of Things: A Review Security in the Internet of Things: A Review,” no. March 2015, 2012.
[7] H. Kaur, V. Verma, and J. Mishra, “Survey Paper cryptography”, pp 129-136.
[8] K. Lam and C. Chi, “Identity in the Internet-of-Things (IoT): New Challenges and Opportunities,” vol. 1, pp. 18– 26, 2016.
[9] “IOT SECURITY SOLUTIONS White paper”.
[10] T. Yousuf, R. Mahmoud, F. Aloul, and I. Zualkernan, vol. 5, no. 4, pp. 608–616, 2015. [10]
[11] R. Jain, “IoT Security: A Survey Abstract:” pp. 1–15.
[12] Z. Quan, T. Chunming, Z. Xianghan, and R. Chunming, “A secure user authentication protocol for sensor network in data capturing,” 2015.
[13] L. Duan, Y. Zhang, S. Chen, S. Wang, B. Cheng, and J. Chen, “Realizing IoT service’s policy privacy over publish / subscribe ‑ based middleware,” Springer plus, 2016.
[14] D. Sey, “A survey on authentication methods for the Internet of Things,” 2018.
[15] S. Tayal, N. Gupta, and P. Gupta, “A Review paper on Network Security and Cryptography,” vol. 10, no. 5, pp. 763–770, 2017.
[16] T. Borgohain, “Survey of Security and Privacy Issues of Internet of Things,” pp. 1–7.