The embedded framework for securing the internet of things
The smart devices connected on the internet turn to be the internet of things, which connect other objects or devices through unique identifiers with the capability of transferring and receiving the information over the internet. there are numerous applications in different areas such as healthcare,...
Saved in:
| Published in: | Maǧallaẗ al-abḥath al-handasiyyaẗ Vol. 9; no. 2; pp. 139 - 148 |
|---|---|
| Main Authors: | , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Kuwait
Kuwait University, Academic Publication Council
01.06.2021
|
| ISSN: | 2307-1877, 2307-1885 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | The smart devices connected on the internet turn to be the internet of things, which connect other objects or devices through unique identifiers with the capability of transferring and receiving the information over the internet. there are numerous applications in different areas such as healthcare, home automation, transportation, military, agriculture, and still so many sectors that incorporate cutting-edge technologies of communication, networking, cloud computing, sensing, and actuation. with this huge increase in the number of connected devices, a strong security mechanism is required to protect the IoT devices. hence, it is required to focus on the challenges and issues of IoT enabled applications to safeguard the entire network from the outside invasion. this paper discusses some of the challenges in building IoT applications, a detailed study of the existing security protocols, and its issues, and the potential of the IoT. |
|---|---|
| AbstractList | The smart devices connected on the internet turn to be the internet of things, which connect other objects or devices through unique identifiers with the capability of transferring and receiving the information over the internet. there are numerous applications in different areas such as healthcare, home automation, transportation, military, agriculture, and still so many sectors that incorporate cutting-edge technologies of communication, networking, cloud computing, sensing, and actuation. with this huge increase in the number of connected devices, a strong security mechanism is required to protect the IoT devices. hence, it is required to focus on the challenges and issues of IoT enabled applications to safeguard the entire network from the outside invasion. this paper discusses some of the challenges in building IoT applications, a detailed study of the existing security protocols, and its issues, and the potential of the IoT. |
| Author | Anandharaj, G. Khan, A. B. Feroz |
| Author_xml | – sequence: 1 fullname: Khan, A. B. Feroz organization: Department of MCA, C. Abdul Hakeem College of Engineering and Technology, Melvisharam, India – sequence: 2 fullname: Anandharaj, G. organization: PG and Research Department of Computer Science, Adhiparasakthi College of Arts and Science, Kalavai, India |
| BookMark | eNp1j8tKAzEUhoNUsNZuXcq8wIy5ziTupHiDgpu6Hk4yJ5razkgSFd_eqRUFwdW5cL7_8B2TST_0SMgpo5WoDTXna4zVmwm8MpqLAzLlgjYl01pNfvqmOSLzlNaUUkaFVEJNycXqCQvcWuw67AofYYvvQ3wu_BCLhO41hv6xyONN6DPGHnMx-HEet-mEHHrYJJx_1xl5uL5aLW7L5f3N3eJyWTpBeS5B1uCt9hyE0lJayRiCNryBmgHX0tFGWmulYbQWomNO0dqphoJythbOiBmp9rkuDilF9O1LDFuIHy2j7Zd8O8q3O_l2Jz8C8g_gQoYchj5HCJv_sbM9hmM4evh9I43UkolPRQVrAw |
| CitedBy_id | crossref_primary_10_1007_s11227_021_04070_2 crossref_primary_10_1007_s11227_021_04095_7 crossref_primary_10_3233_JCS_210027 crossref_primary_10_1007_s13198_021_01369_4 |
| Cites_doi | 10.1109/ACCESS.2017.2780124 10.1007/s42452-019-1628-4 10.1049/iet-cdt.2018.5098 10.1007/3-540-45748-8_24 10.1016/j.drudis.2016.11.009 10.1109/COMST.2015.2388550 10.1080/23738871.2017.1366536 |
| ContentType | Journal Article |
| DBID | ADJCN AHFXO AAYXX CITATION |
| DOI | 10.36909/jer.v9i2.9823 |
| DatabaseName | الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 2307-1885 |
| EndPage | 148 |
| ExternalDocumentID | 10_36909_jer_v9i2_9823 1494841 |
| GroupedDBID | 0R~ 4.4 AAKKN AALRI AAXUO AAYWO ABDBF ABEEZ ABJIA ACACY ACVFH ADCNI ADJCN ADVLN AENEX AEUPX AFGXO AFKAO AFPUW AFWDF AHFXO AIGII AITUG AKBMS AKRWK AKYEP ALMA_UNASSIGNED_HOLDINGS AMRAJ C24 C6C EBS EJD EOJEC FDB GROUPED_DOAJ OBODZ OK1 RNS SES TUS AAYXX CITATION |
| ID | FETCH-LOGICAL-c302t-a46afb8f2a35844b411ea8927a61a284c074bbb4910633d1c506c570a5cb63c93 |
| ISICitedReferencesCount | 9 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000656664700010&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2307-1877 |
| IngestDate | Tue Nov 18 21:36:20 EST 2025 Thu Nov 13 04:32:16 EST 2025 Thu Sep 25 15:26:39 EDT 2025 |
| IsDoiOpenAccess | false |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 2 |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c302t-a46afb8f2a35844b411ea8927a61a284c074bbb4910633d1c506c570a5cb63c93 |
| OpenAccessLink | https://kuwaitjournals.org/jer/index.php/JER/article/download/9823/1969 |
| PageCount | 10 |
| ParticipantIDs | crossref_primary_10_36909_jer_v9i2_9823 crossref_citationtrail_10_36909_jer_v9i2_9823 emarefa_primary_1494841 |
| PublicationCentury | 2000 |
| PublicationDate | 2021-06-01 |
| PublicationDateYYYYMMDD | 2021-06-01 |
| PublicationDate_xml | – month: 06 year: 2021 text: 2021-06-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Kuwait |
| PublicationPlace_xml | – name: Kuwait |
| PublicationTitle | Maǧallaẗ al-abḥath al-handasiyyaẗ |
| PublicationYear | 2021 |
| Publisher | Kuwait University, Academic Publication Council |
| Publisher_xml | – name: Kuwait University, Academic Publication Council |
| References | Feroz Khan (10.36909/jer.v9i2.9823_bb0030) 2020 Kumar (10.36909/jer.v9i2.9823_bb0065) 2016; 5772-5781 Maple (10.36909/jer.v9i2.9823_bb0020) 2017; 2 10.36909/jer.v9i2.9823_bb0045 Andrea (10.36909/jer.v9i2.9823_bb0010) 2015 Kaedi (10.36909/jer.v9i2.9823_bb0070) 2018; 12 10.36909/jer.v9i2.9823_bb0015 Granjal (10.36909/jer.v9i2.9823_bb0040) 2015; 17 Singh (10.36909/jer.v9i2.9823_bb0050) 2017; 14 Vignesh (10.36909/jer.v9i2.9823_bb0085) 2017; 5 Jain (10.36909/jer.v9i2.9823_bb0005) 2012 Curiac (10.36909/jer.v9i2.9823_bb0025) Xie (10.36909/jer.v9i2.9823_bb0090) 2014; 1430-1432 Feroz Khan (10.36909/jer.v9i2.9823_bb0035) 2019; 1 Rose (10.36909/jer.v9i2.9823_bb0055) 2015 Kumar (10.36909/jer.v9i2.9823_bb0075) 2017; 2017 10.36909/jer.v9i2.9823_bb0060 Qiu (10.36909/jer.v9i2.9823_bb0080) 2018; 6 |
| References_xml | – ident: 10.36909/jer.v9i2.9823_bb0060 – volume: 14 start-page: 710 issue: 1 year: 2017 ident: 10.36909/jer.v9i2.9823_bb0050 article-title: A Survey on Wireless Sensor Network (WSN): Security Issues, Challenges and Solutions publication-title: Journal of Advances and Scholarly Researches in Allied Education – start-page: 430 year: 2012 ident: 10.36909/jer.v9i2.9823_bb0005 article-title: Security Solutions for Wireless Sensor Networks – ident: 10.36909/jer.v9i2.9823_bb0025 – volume: 6 start-page: 7452 issue: 2018 year: 2018 ident: 10.36909/jer.v9i2.9823_bb0080 article-title: A Robust Mutual Authentication Scheme Based on Elliptic Curve Cryptography for Telecare Medical Information Systems publication-title: IEEE Access doi: 10.1109/ACCESS.2017.2780124 – volume: 1 start-page: 1575 year: 2019 ident: 10.36909/jer.v9i2.9823_bb0035 article-title: A cognitive key management technique for energy efficiency and scalability in securing the sensor nodes in the IoT environment: CKMT publication-title: SN Appl. Sci. doi: 10.1007/s42452-019-1628-4 – volume: 12 start-page: 279 issue: 6 year: 2018 ident: 10.36909/jer.v9i2.9823_bb0070 article-title: Low-complexity and differential power analysis (DPA)-resistant two-folded power-aware Rivest–Shamir–Adleman (RSA) security schema implementation for IoT-connected devices publication-title: IET Computers & Digital Techniques doi: 10.1049/iet-cdt.2018.5098 – ident: 10.36909/jer.v9i2.9823_bb0045 doi: 10.1007/3-540-45748-8_24 – start-page: 1 year: 2015 ident: 10.36909/jer.v9i2.9823_bb0055 article-title: The internet of things: An overview publication-title: The Internet Society (ISOC) – volume: 5772-5781 year: 2016 ident: 10.36909/jer.v9i2.9823_bb0065 article-title: Security in Internet of Things: Challenges publication-title: Solutions and Future Directions. – year: 2020 ident: 10.36909/jer.v9i2.9823_bb0030 article-title: A Multi-layer Security approach for DDoS detection in Internet of Things publication-title: International Journal of Intelligent Unmanned Systems. – ident: 10.36909/jer.v9i2.9823_bb0015 doi: 10.1016/j.drudis.2016.11.009 – start-page: 180 year: 2015 ident: 10.36909/jer.v9i2.9823_bb0010 article-title: Internet of Things: Security vulnerabilities and challenges publication-title: Proc. IEEE Symp. Comput. Commun. (ISCC) – volume: 1430-1432 start-page: 2014 year: 2014 ident: 10.36909/jer.v9i2.9823_bb0090 article-title: An Item-Level Access Control Framework for Inter-System Security in the Internet of Things publication-title: Applied Mechanics and Materials – volume: 17 start-page: 1294 issue: 3 year: 2015 ident: 10.36909/jer.v9i2.9823_bb0040 article-title: Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues publication-title: IEEE Commun. Surv. Tutorials doi: 10.1109/COMST.2015.2388550 – volume: 2 start-page: 155 issue: 2 year: 2017 ident: 10.36909/jer.v9i2.9823_bb0020 article-title: Security and privacy in the internet of things publication-title: Journal of Cyber Policy doi: 10.1080/23738871.2017.1366536 – volume: 2017 start-page: 1 year: 2017 ident: 10.36909/jer.v9i2.9823_bb0075 article-title: “A review on communication protocols using internet of things,” 2017 International conference on Microelectronic Devices, Circuits and Systems (ICMDCS) publication-title: Vellore – volume: 5 start-page: 417 issue: 1 year: 2017 ident: 10.36909/jer.v9i2.9823_bb0085 article-title: Security on Internet of Things (IOT) with Challenges and Countermeasures publication-title: IJEDR |
| SSID | ssj0001034535 |
| Score | 2.2584586 |
| Snippet | The smart devices connected on the internet turn to be the internet of things, which connect other objects or devices through unique identifiers with the... |
| SourceID | crossref emarefa |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 139 |
| Title | The embedded framework for securing the internet of things |
| URI | https://search.emarefa.net/detail/BIM-1494841 |
| Volume | 9 |
| WOSCitedRecordID | wos000656664700010&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2307-1885 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001034535 issn: 2307-1877 databaseCode: DOA dateStart: 20140101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVAVX databaseName: SpringerOpen customDbUrl: eissn: 2307-1885 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001034535 issn: 2307-1877 databaseCode: C24 dateStart: 20140601 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELaggAQHxJvyqHIg4rDKkvgRx9zSVQEJqDgUqbdo7Hhh0TZb7S5Vy69nbCfZbAVSOXCJEsu2Es-n8Xgy8w0hr2qjlQaTOipEmnBeiwRYLROtLG4PpqA1eHb9T_LwsDg-Vl_a7JKVLycgm6Y4P1en_1XU2IbCdqmz_yDuflJswHsUOl5R7Hi9suDtibaoUerRtIu98uGEq-Bc_zYImbQ-EiBU7xwaqp8hnsi4lM7PHh9k8X4ZKzmCeQLaPxZxKcClxc0T53uH1eziYtNx4KVe_Bp9_B68rOV4f7xxO-AoRxbt_x69Hw-9D3QQJRWUFPUkk0VbiqXVqGoAHDrQjlngLWo32ixQbF7W4QzP644D9Yddjs_UjI5VETKSt8myL21ifWghHmr8DBWOr9z4yo2_Tm5QKZRTe5M2HcY74VLGhS_C2n9HIPb0U7zZeoUtw-WWPQG8gYEtcnSP3G0PEVEZhH-fXLPNA3JnQC35kLxFGEQdDKIeBhHCIOpgECEMog4G0WIaBRg8Il_fHRxNPiRtnYzEsJSuE-A5THUxpcDQnOSaZ5mFQlEJeQZofhg0E7XWHC3DnLE6MyLNjZApCKNzZhR7THaaRWOfkigtDKCBYh3FD5p6qTKccW7rXAgtBcAuSbpFqExLIu9qmcyrP6_7Lnnd9z8N9Cl_7fmkXdNNR0ddxLNnV57jObm9wegLsrNe_rQvyU1ztp6tlnte9Hve6fIb3pZqWQ |
| linkProvider | Springer Nature |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=The+embedded+framework+for+securing+the+Internet+of+Things&rft.jtitle=Ma%C7%A7alla%E1%BA%97+al-ab%E1%B8%A5ath+al-handasiyya%E1%BA%97&rft.au=Feroz+Khan%2C+A.B.&rft.au=Anandharaj%2C+G.&rft.date=2021-06-01&rft.issn=2307-1877&rft.volume=9&rft.issue=2&rft.spage=139&rft.epage=148&rft_id=info:doi/10.36909%2Fjer.v9i2.9823&rft.externalDBID=n%2Fa&rft.externalDocID=10_36909_jer_v9i2_9823 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2307-1877&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2307-1877&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2307-1877&client=summon |