ABSTRACT
Devices in the consumer, commercial, healthcare and industrial sectors are becoming increasingly more connected to the Internet. These interconnected devices range from smart devices in the home and wearable health monitoring devices to sensors and a…
See full abstracts, authors, references, citations & other publication information.
+
…ctuators within critical infrastructure environments. The framework of connected devices that share data is referred as the Internet of Things (IoT). There is an increasing security concern regarding this framework and devices that are considered part of IoT. As the number of devices that are able to send sensitive information over networks increases, so does the threat of this data being compromised. To mitigate and minimize this threat, research has been performed to develop a number of potential approaches to increase security levels for these IoT devices. This paper will present a few of those security risks and mitigations, as well as best practices to implement by administrators of IoT networks.
Full Text/Reference Website: https://www.cscjournals.org/library/manuscriptinfo.php?mc=IJCSS-1588

AUTHORS
Mr. Eric Brown – Applied Information Technology, University of Baltimore, Baltimore, Maryland – United States of America
Dr. Mohammed Ketel – Applied Information Technology, University of Baltimore, Baltimore, Maryland – United States of America
KEYWORDS
Internet of Things, Architecture, Security, Mitigation, Best Practices.
Indexing Keywords: The Internet of Things: Architecture Security Threats and Risk Mitigation Techniques, The Internet of Things: Architecture, The Internet of Things: Architecture and Security Threats, The Internet of Things: Architecture and Risk Mitigation Techniques, The Internet of Things: Security Threats and Risk Mitigation Techniques, The Internet of Things, Security Threats, Risk Mitigation Techniques.
Pages: 187-199
Revised: 30-11-2020
Published: 31-12-2020Published in International Journal of Computer Science and Security (IJCSS).
Volume: 14
Issue: 5
Publication Date: 31-12-2020
*Randomly selected references used in the publication “The Internet of Things: Architecture, Security Threats, and Risk Mitigation Techniques”.
- J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of Things (IoT): A vision, architectural elements, and future directions,†Elsevier, Future Generation Computer Systems Volume 29, Issue 7, pp. 1645-1660, 2013.
- N. Lethaby, “Wireless connectivity for the Internet of Things: One size does not fit all,†Texas Instruments (TI), pp. 6 – 12, 2017.
- V. Baños-Gonzalez, MS Afaqui, E. Lopez-Aguilera, and E. Garcia-Villegas, “IEEE 802.11ah: A Technology to Face the IoT Challenge,†MDPI, Sensors, pp. 1 -21, 2016.
- Y. Yang, L. Wu, G. Yin, L. Li, and H. Zhao, “A Survey on Security and Privacy Issues in Internet-of-Things,†IEEE Internet of Things Journal, Volume 4, Issue 5, pp. 1250 – 1258, 2017.
- AM. Nia, and NK. Jha, “A Comprehensive Study of Security of Internet-of-Things,†IEEE Transactions on Emerging Topics in Computing 5 (4), 1-19, 2016.
- A. Banafa, “Three Major Challenges Facing IoT,†IEEE IoT Newsletter, https://iot.ieee.org/newsletter/march-2017/three-major-challenges-facing-iot [Accessed November 5, 2019].
- S. Singh, PK. Sharma, SY. Moon and JH. Park, “Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions,†Springer, Journal of Ambient Intelligence and Humanized Computing, 2017.
- ENISA, “Good Practices for Security of Internet of Things in the context of Smart Manufacturing†November 2018.
- S. Wang, R. Shumba, and W. Kelly, “Security by Design: Defense-in-Depth IoT Architectureâ€, Journal of The Colloquium for Information System Security Education (CISSE), Edition 4, Issue 2, pp. 2 – 9, 2017.
- E. Fernandez, N. Yoshioka, and H. Washizaki, “Abstract and IoT security patterns for network segmentationâ€, 2019. Procs. Asian PLoP’19, 2019.
CITATIONS
Citations used in the publication “The Internet of Things: Architecture, Security Threats, and Risk Mitigation Techniques”.
Currently there are no citations collected for this publication at scholarlyabstracts.com.
-
CONTACT US
Please feel free to us at scholarlyabstracts@gmail.com if you wish to:
- Get your journal, conference or thesis, registered with us.
- Update this publication content.