2019 3rd International Conference on Electronics, Communication and Aerospace Technology (ICECA) 2019
DOI: 10.1109/iceca.2019.8821970
|View full text |Cite
|
Sign up to set email alerts
|

IoT: Leading Challenges, Issues and Explication Using Latest Technologies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(3 citation statements)
references
References 16 publications
0
2
0
1
Order By: Relevance
“…Open Internet sources or IoT protocols have limited security approaches. The secure IoT aided systems require security algorithms for high data confidentiality and integrity to save information of multiple nodes, systems, devices and resources [190,191]. • Cyber attack and identity spoofing: Cyber-attacks for IoT aided systems is a serious issue that puts question mark over system's reliability and stability.…”
Section: Security and Privacy Challengesmentioning
confidence: 99%
“…Open Internet sources or IoT protocols have limited security approaches. The secure IoT aided systems require security algorithms for high data confidentiality and integrity to save information of multiple nodes, systems, devices and resources [190,191]. • Cyber attack and identity spoofing: Cyber-attacks for IoT aided systems is a serious issue that puts question mark over system's reliability and stability.…”
Section: Security and Privacy Challengesmentioning
confidence: 99%
“…Conventional cryptographic primitives are not acceptable for low resource smart devices due to their low computation power ability, having limited battery life, having small size, small memory and limited power supply [5,6]. IoT also faces various security challenges like heterogeneity of communication standards and information system technologies among devices, scalability issues due to numerous increasing devices day by day [7], resource limitation of devices due to constraints in computing power, storage capacity and the power usage, and mobility of devices due to having small size and portability in nature [8]. Devices in IoT communicate with each other, hence failure of anyone can not affect the normal execution of the network.…”
Section: Introductionmentioning
confidence: 99%
“…A computac ¸ão em nuvem tem a capacidade de processamento ideal para lidar com grandes volumes de dados [Patel et al 2019]. Além disso, o modelo baseado na nuvem tornou-se a abordagem padrão para a IoT [Coutinho et al 2017], porém requer que todos os dados sejam enviados pela internet, o que leva a problemas como congestionamento da rede de comunicac ¸ão [Ravi Teja et al 2015].…”
Section: Introduc ¸ãOunclassified