The embedded framework for securing the internet of things

The smart devices connected on the internet turn to be the internet of things, which connect other objects or devices through unique identifiers with the capability of transferring and receiving the information over the internet. there are numerous applications in different areas such as healthcare,...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Maǧallaẗ al-abḥath al-handasiyyaẗ Ročník 9; číslo 2; s. 139 - 148
Hlavní autoři: Khan, A. B. Feroz, Anandharaj, G.
Médium: Journal Article
Jazyk:angličtina
Vydáno: Kuwait Kuwait University, Academic Publication Council 01.06.2021
ISSN:2307-1877, 2307-1885
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract The smart devices connected on the internet turn to be the internet of things, which connect other objects or devices through unique identifiers with the capability of transferring and receiving the information over the internet. there are numerous applications in different areas such as healthcare, home automation, transportation, military, agriculture, and still so many sectors that incorporate cutting-edge technologies of communication, networking, cloud computing, sensing, and actuation. with this huge increase in the number of connected devices, a strong security mechanism is required to protect the IoT devices. hence, it is required to focus on the challenges and issues of IoT enabled applications to safeguard the entire network from the outside invasion. this paper discusses some of the challenges in building IoT applications, a detailed study of the existing security protocols, and its issues, and the potential of the IoT.
AbstractList The smart devices connected on the internet turn to be the internet of things, which connect other objects or devices through unique identifiers with the capability of transferring and receiving the information over the internet. there are numerous applications in different areas such as healthcare, home automation, transportation, military, agriculture, and still so many sectors that incorporate cutting-edge technologies of communication, networking, cloud computing, sensing, and actuation. with this huge increase in the number of connected devices, a strong security mechanism is required to protect the IoT devices. hence, it is required to focus on the challenges and issues of IoT enabled applications to safeguard the entire network from the outside invasion. this paper discusses some of the challenges in building IoT applications, a detailed study of the existing security protocols, and its issues, and the potential of the IoT.
Author Anandharaj, G.
Khan, A. B. Feroz
Author_xml – sequence: 1
  fullname: Khan, A. B. Feroz
  organization: Department of MCA, C. Abdul Hakeem College of Engineering and Technology, Melvisharam, India
– sequence: 2
  fullname: Anandharaj, G.
  organization: PG and Research Department of Computer Science, Adhiparasakthi College of Arts and Science, Kalavai, India
BookMark eNp1j8tKAzEUhoNUsNZuXcq8wIy5ziTupHiDgpu6Hk4yJ5razkgSFd_eqRUFwdW5cL7_8B2TST_0SMgpo5WoDTXna4zVmwm8MpqLAzLlgjYl01pNfvqmOSLzlNaUUkaFVEJNycXqCQvcWuw67AofYYvvQ3wu_BCLhO41hv6xyONN6DPGHnMx-HEet-mEHHrYJJx_1xl5uL5aLW7L5f3N3eJyWTpBeS5B1uCt9hyE0lJayRiCNryBmgHX0tFGWmulYbQWomNO0dqphoJythbOiBmp9rkuDilF9O1LDFuIHy2j7Zd8O8q3O_l2Jz8C8g_gQoYchj5HCJv_sbM9hmM4evh9I43UkolPRQVrAw
CitedBy_id crossref_primary_10_1007_s11227_021_04070_2
crossref_primary_10_1007_s11227_021_04095_7
crossref_primary_10_3233_JCS_210027
crossref_primary_10_1007_s13198_021_01369_4
Cites_doi 10.1109/ACCESS.2017.2780124
10.1007/s42452-019-1628-4
10.1049/iet-cdt.2018.5098
10.1007/3-540-45748-8_24
10.1016/j.drudis.2016.11.009
10.1109/COMST.2015.2388550
10.1080/23738871.2017.1366536
ContentType Journal Article
DBID ADJCN
AHFXO
AAYXX
CITATION
DOI 10.36909/jer.v9i2.9823
DatabaseName الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals
معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete
CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2307-1885
EndPage 148
ExternalDocumentID 10_36909_jer_v9i2_9823
1494841
GroupedDBID 0R~
4.4
AAKKN
AALRI
AAXUO
AAYWO
ABDBF
ABEEZ
ABJIA
ACACY
ACVFH
ADCNI
ADJCN
ADVLN
AENEX
AEUPX
AFGXO
AFKAO
AFPUW
AFWDF
AHFXO
AIGII
AITUG
AKBMS
AKRWK
AKYEP
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
C24
C6C
EBS
EJD
EOJEC
FDB
GROUPED_DOAJ
OBODZ
OK1
RNS
SES
TUS
AAYXX
CITATION
ID FETCH-LOGICAL-c302t-a46afb8f2a35844b411ea8927a61a284c074bbb4910633d1c506c570a5cb63c93
ISICitedReferencesCount 9
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000656664700010&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2307-1877
IngestDate Tue Nov 18 21:36:20 EST 2025
Thu Nov 13 04:32:16 EST 2025
Thu Sep 25 15:26:39 EDT 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 2
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c302t-a46afb8f2a35844b411ea8927a61a284c074bbb4910633d1c506c570a5cb63c93
OpenAccessLink https://kuwaitjournals.org/jer/index.php/JER/article/download/9823/1969
PageCount 10
ParticipantIDs crossref_primary_10_36909_jer_v9i2_9823
crossref_citationtrail_10_36909_jer_v9i2_9823
emarefa_primary_1494841
PublicationCentury 2000
PublicationDate 2021-06-01
PublicationDateYYYYMMDD 2021-06-01
PublicationDate_xml – month: 06
  year: 2021
  text: 2021-06-01
  day: 01
PublicationDecade 2020
PublicationPlace Kuwait
PublicationPlace_xml – name: Kuwait
PublicationTitle Maǧallaẗ al-abḥath al-handasiyyaẗ
PublicationYear 2021
Publisher Kuwait University, Academic Publication Council
Publisher_xml – name: Kuwait University, Academic Publication Council
References Feroz Khan (10.36909/jer.v9i2.9823_bb0030) 2020
Kumar (10.36909/jer.v9i2.9823_bb0065) 2016; 5772-5781
Maple (10.36909/jer.v9i2.9823_bb0020) 2017; 2
10.36909/jer.v9i2.9823_bb0045
Andrea (10.36909/jer.v9i2.9823_bb0010) 2015
Kaedi (10.36909/jer.v9i2.9823_bb0070) 2018; 12
10.36909/jer.v9i2.9823_bb0015
Granjal (10.36909/jer.v9i2.9823_bb0040) 2015; 17
Singh (10.36909/jer.v9i2.9823_bb0050) 2017; 14
Vignesh (10.36909/jer.v9i2.9823_bb0085) 2017; 5
Jain (10.36909/jer.v9i2.9823_bb0005) 2012
Curiac (10.36909/jer.v9i2.9823_bb0025)
Xie (10.36909/jer.v9i2.9823_bb0090) 2014; 1430-1432
Feroz Khan (10.36909/jer.v9i2.9823_bb0035) 2019; 1
Rose (10.36909/jer.v9i2.9823_bb0055) 2015
Kumar (10.36909/jer.v9i2.9823_bb0075) 2017; 2017
10.36909/jer.v9i2.9823_bb0060
Qiu (10.36909/jer.v9i2.9823_bb0080) 2018; 6
References_xml – ident: 10.36909/jer.v9i2.9823_bb0060
– volume: 14
  start-page: 710
  issue: 1
  year: 2017
  ident: 10.36909/jer.v9i2.9823_bb0050
  article-title: A Survey on Wireless Sensor Network (WSN): Security Issues, Challenges and Solutions
  publication-title: Journal of Advances and Scholarly Researches in Allied Education
– start-page: 430
  year: 2012
  ident: 10.36909/jer.v9i2.9823_bb0005
  article-title: Security Solutions for Wireless Sensor Networks
– ident: 10.36909/jer.v9i2.9823_bb0025
– volume: 6
  start-page: 7452
  issue: 2018
  year: 2018
  ident: 10.36909/jer.v9i2.9823_bb0080
  article-title: A Robust Mutual Authentication Scheme Based on Elliptic Curve Cryptography for Telecare Medical Information Systems
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2017.2780124
– volume: 1
  start-page: 1575
  year: 2019
  ident: 10.36909/jer.v9i2.9823_bb0035
  article-title: A cognitive key management technique for energy efficiency and scalability in securing the sensor nodes in the IoT environment: CKMT
  publication-title: SN Appl. Sci.
  doi: 10.1007/s42452-019-1628-4
– volume: 12
  start-page: 279
  issue: 6
  year: 2018
  ident: 10.36909/jer.v9i2.9823_bb0070
  article-title: Low-complexity and differential power analysis (DPA)-resistant two-folded power-aware Rivest–Shamir–Adleman (RSA) security schema implementation for IoT-connected devices
  publication-title: IET Computers & Digital Techniques
  doi: 10.1049/iet-cdt.2018.5098
– ident: 10.36909/jer.v9i2.9823_bb0045
  doi: 10.1007/3-540-45748-8_24
– start-page: 1
  year: 2015
  ident: 10.36909/jer.v9i2.9823_bb0055
  article-title: The internet of things: An overview
  publication-title: The Internet Society (ISOC)
– volume: 5772-5781
  year: 2016
  ident: 10.36909/jer.v9i2.9823_bb0065
  article-title: Security in Internet of Things: Challenges
  publication-title: Solutions and Future Directions.
– year: 2020
  ident: 10.36909/jer.v9i2.9823_bb0030
  article-title: A Multi-layer Security approach for DDoS detection in Internet of Things
  publication-title: International Journal of Intelligent Unmanned Systems.
– ident: 10.36909/jer.v9i2.9823_bb0015
  doi: 10.1016/j.drudis.2016.11.009
– start-page: 180
  year: 2015
  ident: 10.36909/jer.v9i2.9823_bb0010
  article-title: Internet of Things: Security vulnerabilities and challenges
  publication-title: Proc. IEEE Symp. Comput. Commun. (ISCC)
– volume: 1430-1432
  start-page: 2014
  year: 2014
  ident: 10.36909/jer.v9i2.9823_bb0090
  article-title: An Item-Level Access Control Framework for Inter-System Security in the Internet of Things
  publication-title: Applied Mechanics and Materials
– volume: 17
  start-page: 1294
  issue: 3
  year: 2015
  ident: 10.36909/jer.v9i2.9823_bb0040
  article-title: Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues
  publication-title: IEEE Commun. Surv. Tutorials
  doi: 10.1109/COMST.2015.2388550
– volume: 2
  start-page: 155
  issue: 2
  year: 2017
  ident: 10.36909/jer.v9i2.9823_bb0020
  article-title: Security and privacy in the internet of things
  publication-title: Journal of Cyber Policy
  doi: 10.1080/23738871.2017.1366536
– volume: 2017
  start-page: 1
  year: 2017
  ident: 10.36909/jer.v9i2.9823_bb0075
  article-title: “A review on communication protocols using internet of things,” 2017 International conference on Microelectronic Devices, Circuits and Systems (ICMDCS)
  publication-title: Vellore
– volume: 5
  start-page: 417
  issue: 1
  year: 2017
  ident: 10.36909/jer.v9i2.9823_bb0085
  article-title: Security on Internet of Things (IOT) with Challenges and Countermeasures
  publication-title: IJEDR
SSID ssj0001034535
Score 2.2584586
Snippet The smart devices connected on the internet turn to be the internet of things, which connect other objects or devices through unique identifiers with the...
SourceID crossref
emarefa
SourceType Enrichment Source
Index Database
Publisher
StartPage 139
Title The embedded framework for securing the internet of things
URI https://search.emarefa.net/detail/BIM-1494841
Volume 9
WOSCitedRecordID wos000656664700010&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 2307-1885
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001034535
  issn: 2307-1877
  databaseCode: DOA
  dateStart: 20140101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVAVX
  databaseName: SpringerOpen
  customDbUrl:
  eissn: 2307-1885
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001034535
  issn: 2307-1877
  databaseCode: C24
  dateStart: 20140601
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELZWBSQ4IN6UR-UDEYdVlth52dzSpQUhtOJQpN4i23HUoG222k2Xlj_DX2VsJ9kEqRIcuESJ13G0M6PJ-MvMNwi94QVLRSSJqeihfqS49hnV3C-TQJOgMB-GrKa_pIsFOz3lXyeTX10tzHaZ1jW7uuIX_1XVMAbKNqWz_6DuflEYgHNQOhxB7XD8a8Xrc6nBoxTTssu9sumEGweuu_qoymKBunFZAj1g3nV3Et489bLU4OzeEfEOM4-nU7H0hbSXzMtiYcrilr7B3sWmur7eTezd-JnDV7PZ9HA2Pdbr1c8d7gC3GbZo-_no42wIP9BBmpRL5r_8IapmkEViFx2l9jvo0dbYqzZtxPo3avkpWdvFRQ_HXBefzkHzgR3SgbMljgapfW8Tx9j55yshhO2_oVT9rtezLa_ojDNX4Dzm3s4-fJ4vxsNuj2Tocwwxwi2axty4zXlbTmNBvCCMYtvEtf8zjhjUPvXd6JmjwOeOPhdwIgaxzMkDdL_dhODMGc9DNNH1I3RvQE35GL0HM8KdGeHejDCYEe7MCIMZ4c6M8KrEzoyeoG_HRyfzT37bZ8NXYUAbX0SJKCUrqQghHI1kRIgWjNNUJERA-KIgzJRSRhBZJmFYEBUHiYrTQMRKJqHi4VO0V69q_RxhHkpamBg-hvmaKAbLUNMSgOmEsULvI78TQq5aEnrTC2WZw2bUCi0HoeVGaLkR2j5628-_cPQrN8581sp0N9Hp7sWNv7xEd3cm_QrtNetL_RrdVtum2qwPrKoPLEjzG5qnez4
linkProvider Springer Nature
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=The+embedded+framework+for+securing+the+internet+of+things&rft.jtitle=Ma%C7%A7alla%E1%BA%97+al-ab%E1%B8%A5ath+al-handasiyya%E1%BA%97&rft.au=Khan%2C+A.+B.+Feroz&rft.au=Anandharaj%2C+G.&rft.date=2021-06-01&rft.pub=Kuwait+University%2C+Academic+Publication+Council&rft.issn=2307-1877&rft.eissn=2307-1885&rft.volume=9&rft.issue=2&rft.spage=139&rft.epage=148&rft_id=info:doi/10.36909%2Fjer.v9i2.9823&rft.externalDBID=ADJCN&rft.externalDocID=1494841
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2307-1877&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2307-1877&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2307-1877&client=summon