International Research journal of Management Science and Technology

  ISSN 2250 - 1959 (online) ISSN 2348 - 9367 (Print) New DOI : 10.32804/IRJMST

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 61    Submit Your Rating     Cite This   Download        Certificate

A STUDY OF SECURITY TECHNIQUES FOR INTERNET OF THINGS APPLICATIONS

    4 Author(s):  V.HARSHA SHASTRI , V.SREEPRADA , P.SREE RATHNA MALATHI , K.SIVARAMA KRISHNA

Vol -  6, Issue- 10 ,         Page(s) : 167 - 172  (2015 ) DOI : https://doi.org/10.32804/IRJMST

Abstract

The Internet of Things (IoT) can be defined as a global network which enables monitoring and control of the physical environment by collecting, processing, and analyzing the data generated by sensors or smart objects. Every day physical objects will be connected to the Internet and be able to identify themselves to other devices. IoT is new revolution of the Internet and will effect in a large number of applications such as smart living, smart home, health care systems, smart manufacturing, and environment monitoring and smart logistics. This paper provides integration, summarizes and surveys some of the security techniques especially in healthcare in IoT environment.

  1. Vermesan, O. and Friess, P. (2014) Internet of Things Applications—From Research and Innovation to Market Deployment (River Publishers Series in Communications).
  2. Tyagi, S., Darwish, A. and Khan, M.Y. (2014) Managing Computing Infrastructure for IoT Data. Advances in Internet of Things, 4, 29-35.
  3. http://dx.doi.org/10.4236/ait.2014.43005
  4. Ashton, K. (2009) That “Internet of Things” Thing. RFiD Journal, 22, 97-114.
  5. Darwish, A., Tyagi, S. and Agarwal, A. (2015) A New Model for IoT Based Healthcare Systems Using Cloud Computing. (Under Publication)
  6. Tarouco, L.M.R., Bertholdo, L.M., Granville, L.Z. and Arbiza, L.M.R. (2012) Internet of Things in Healthcare: Interoperatibility and Security Issues. 2012 IEEE International Conference on Communications (ICC), Ottawa, 10-15 June 2012, 621-6125.
  7. http://dx.doi.org/10.1109/ICC.2012.6364830
  8. Kayarkar, H. (2012) Classification of Various Security Techniques in Databases and Their Comparative Analysis.
  9. ACTA Technica Corviniensis, 5, 135-138.
  10. Yu, S. (2013) IEEE Standards Association to Exhibit at 2013, International Consumer Electronics Show and Highlight
  11. Enabling Consumer Connectivity through Consensus Building.
  12. http://standards.ieee.org/news/2013/ces2013.html#sthash.7rFlFzwB.dpuf
  13. Schonfeld, E. (2010) Costolo: Twitter Now Has 190 Million Users Tweeting 65 Million Times a Day.
  14. http://techcrunch.com/2010/06/08/twitter-190-million-users/
  15. Li, W.C., Yi, P., Wu, Y., Pan, L. and Li, J.H. (2014) A New Intrusion Detection Application Based on KNN Classification Algorithm in Wireless Sensor Network. Journal of Electrical and Computer Engineering, 2014, Article ID:240217. http://dx.doi.org/10.1155/2014/240217
  16. Gupta, R.K. and Singh, P. (2013) A New Way to Design and Implementation of Hybrid Crypto System for Security of the Information in Public Network. International Journal of Emerging Technology and Advanced Engineering, 3, 2250-2459.
  17. Yu, L.L., Wang, Z.J. and Wang, W.F. (2012) The Application of Hybrid Encryption Algorithm in Software Security.
  18. 2012 4th International Conference on Computational Intelligence and Communication Networks (CICN), Mathura, 3-5 November 2012, 762-765. http://dx.doi.org/10.1109/cicn.2012.195
  19. Malan, D., Jones, T.F., Welsh, M. and Moulton, S. (2004) CodeBlue: An Ad-Hoc Sensor Network Infrastructure for Emergency Medical Care. Proceedings of the MobiSys 2004 Workshop on Applications of Mobile Embedded Systems, Boston, 6-9 June 2004.
  20. Kumar, P. and Lee, H.-J. (2012) Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey. Sensors, 12, 55-91. http://dx.doi.org/10.3390/s120100055
  21. Karulf, E. (2008) Body Area Networks (BAN). A Survey Paper Written under Guidance of Prof. Raj Jain.
  22. http://www.cse.wustl.edu/~jain/cse574-08/ftp/ban.pdf.

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details