Journal article Open Access
M G Padmashree; J S Arunalatha,
<?xml version='1.0' encoding='utf-8'?> <resource xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://datacite.org/schema/kernel-4" xsi:schemaLocation="http://datacite.org/schema/kernel-4 http://schema.datacite.org/meta/kernel-4.1/metadata.xsd"> <identifier identifierType="URL">https://zenodo.org/record/5412081</identifier> <creators> <creator> <creatorName>M G Padmashree</creatorName> <affiliation>Department of Computer Science and Engineering, University Visvesvaraya College of Engineering, Bengaluru, India.</affiliation> </creator> <creator> <creatorName>J S Arunalatha,</creatorName> <familyName>J S Arunalatha</familyName> <affiliation>Department of Computer Science and Engineering, University Visvesvaraya College of Engineering, Bengaluru, India</affiliation> </creator> </creators> <titles> <title>Data Protection Mechanisms in IoT: A Vital</title> </titles> <publisher>Zenodo</publisher> <publicationYear>2021</publicationYear> <subjects> <subject>Access Restriction, Authentication, Identity, Key Management, Lightweight Cryptography, Security</subject> <subject subjectScheme="issn">2249-8958</subject> <subject subjectScheme="handle">100.1/ijeat.F30200810621</subject> </subjects> <contributors> <contributor contributorType="Sponsor"> <contributorName>Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP)</contributorName> <affiliation>Publisher</affiliation> </contributor> </contributors> <dates> <date dateType="Issued">2021-08-30</date> </dates> <language>en</language> <resourceType resourceTypeGeneral="JournalArticle"/> <alternateIdentifiers> <alternateIdentifier alternateIdentifierType="url">https://zenodo.org/record/5412081</alternateIdentifier> </alternateIdentifiers> <relatedIdentifiers> <relatedIdentifier relatedIdentifierType="ISSN" relationType="IsCitedBy" resourceTypeGeneral="JournalArticle">2249-8958</relatedIdentifier> <relatedIdentifier relatedIdentifierType="DOI" relationType="IsIdenticalTo">10.35940/ijeat.F3020.0810621</relatedIdentifier> </relatedIdentifiers> <rightsList> <rights rightsURI="https://creativecommons.org/licenses/by/4.0/legalcode">Creative Commons Attribution 4.0 International</rights> <rights rightsURI="info:eu-repo/semantics/openAccess">Open Access</rights> </rightsList> <descriptions> <description descriptionType="Abstract"><p>The Internet of Things (IoT) associated with life is a budding real-time environment paradigm. Smart Users can control and analyze Things through Smart gadgets connected through the network. As gazillions of devices are connected and communicated via a complex, distributed network, the number of potential threats and attacks has grown drastically against protection and privacy. Security must be provided continuously for IoT service. Exploring the issues to be improved in IoT setup includes Information Secrecy, Access Control, Authentication, Integrity, Privacy, and Trust. The paper summarizes the issues with IoT device security and the efficiency of the existing security solutions. This paper analyses the schemes to guard IoT communications and the methods adopted by the researchers while providing security of data in IoT.</p></description> </descriptions> </resource>
Views | 23 |
Downloads | 40 |
Data volume | 24.9 MB |
Unique views | 20 |
Unique downloads | 40 |