Open Access   Article Go Back

A Survey Paper on Internet of Things and its Data Security Issues

Krishna Priya Gurumanapalli1 , M. Nagendra2

Section:Survey Paper, Product Type: Journal Paper
Volume-6 , Issue-11 , Page no. 818-824, Nov-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i11.818824

Online published on Nov 30, 2018

Copyright © Krishna Priya Gurumanapalli, M. Nagendra . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Krishna Priya Gurumanapalli, M. Nagendra, “A Survey Paper on Internet of Things and its Data Security Issues,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.818-824, 2018.

MLA Style Citation: Krishna Priya Gurumanapalli, M. Nagendra "A Survey Paper on Internet of Things and its Data Security Issues." International Journal of Computer Sciences and Engineering 6.11 (2018): 818-824.

APA Style Citation: Krishna Priya Gurumanapalli, M. Nagendra, (2018). A Survey Paper on Internet of Things and its Data Security Issues. International Journal of Computer Sciences and Engineering, 6(11), 818-824.

BibTex Style Citation:
@article{Gurumanapalli_2018,
author = {Krishna Priya Gurumanapalli, M. Nagendra},
title = {A Survey Paper on Internet of Things and its Data Security Issues},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2018},
volume = {6},
Issue = {11},
month = {11},
year = {2018},
issn = {2347-2693},
pages = {818-824},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3249},
doi = {https://doi.org/10.26438/ijcse/v6i11.818824}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i11.818824}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3249
TI - A Survey Paper on Internet of Things and its Data Security Issues
T2 - International Journal of Computer Sciences and Engineering
AU - Krishna Priya Gurumanapalli, M. Nagendra
PY - 2018
DA - 2018/11/30
PB - IJCSE, Indore, INDIA
SP - 818-824
IS - 11
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
358 300 downloads 259 downloads
  
  
           

Abstract

Data is the driving force in this modern digital era. There are numerous platforms available to send a data from one place to another through computer networks. This survey paper classifies and describes the network classification based on topology, connectivity, and geographic area. A brief introduction on Wireless Sensor Network (WSN) and Internet-of-Things (IoT) has been detailed based on the research. These two technologies are identified as a platform for data processing through different sensors. The data sent through the network using different platform contains all kinds of sensitive information. It is the responsibility of the technology providers to build suitable security systems that assure data privacy. This research paper has focused on a detailed investigation of the Internet-of-Things (IoT) and its data security. Different techniques used for data security are listed, among them, an Encryption technique is found to be effective and well suitable for IoT. This research paper presents the survey of some encryption algorithms. Advanced Encryption Standard (AES), Data Encryption Standard (DES), and Rivest-Shamir-Aldeman (RSA) encryption techniques are briefed.

Key-Words / Index Term

Internet-of-Things (IoT), Data security, Wireless Sensor Network (WSN), Encryption

References

[1] "Types of Wireless Networks | Commotion Wireless", Commotionwireless.net. [Online]. Available: https://commotionwireless.net/docs/cck/networking/types-of-wireless-networks/.[Accessed: 19- Jun- 2018].
[2] C. Cisse, K. Ahmed, C. Sarr and M. Gregory, "Energy efficient Hybrid Clustering Algorithm for Wireless Sensor Network", 2016 26th International Telecommunication Networks and Applications Conference (ITNAC), 2016.
[3] S. Zhang and H. Zhang, "A review of wireless sensor networks and its applications", 2012 IEEE International Conference on Automation and Logistics, 2012.
[4] N. Khalil, M. Abid, D. Benhaddou and M. Gerndt, "Wireless sensors networks for the Internet of Things," 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2014.
[5] D. Evans, The Internet of Things How the Next Evolution of the Internet Is Changing Everything. San Fransisco: Lopez, 2011, pp. 1-6.
[6]Paul Kirby, “Focus on FTC Staff Recommends Internet of Things Best Practices.” Tele communications Report, Vol. 81,No.3,pp-3-3.
[7] B. Al-Shargabi and O. Sabri, "Internet of Things: An exploration study of opportunities and challenges," 2017 International Conference on Engineering & MIS (ICEMIS), 2017.
[8] S. Kashyap, "10 Real World Applications of Internet of Things (IoT) - Explained in Videos", Analytics Vidhya, 2016. [Online]. Available: https://www.analyticsvidhya.com/blog/2016/08/10-youtube-videos-explaining-the-real-world-applications-of-internet-of-things-iot/. [Accessed: 19- Jun- 2018].
[9] "Connected Toys and What You Need to Know About Them", Us.norton.com. [Online]. Available: https://us.norton.com/internetsecurity-iot-connected-toys-and-what-you-need-to-know-about-them.html. [Accessed: 19- Jun- 2018].
[10] A. Roney Mathew and A.Al Hajj, "Secure Communications on IoT and Big Data," Indian Journal of Science and Technology, vol. 10, no. 11, pp. 1-6, 2017.
[11]G. Singh and Supriya, "A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security", International Journal of Computer Applications, vol. 67, no. 19, pp. 33-38, 2013.
[12]B. Daddala, H. Wang and A. Javaid, "Design and implementation of a customized encryption algorithm for authentication and secure communication between devices," 2017 IEEE National Aerospace and Electronics Conference (NAECON), 2017.
[13] M. Noura, H. Noura, A. Chehab, M. Mansour and R. Couturier, "S-DES: An efficient & secure DES variant," 2018 IEEE Middle East and North Africa Communications Conference (MENACOMM), 2018.
[14] A. Mamathashree, K. Remya and B. Kumar, "Fault analysis detection in public key cryptosystems (RSA)," 2017 International Conference on Communication and Signal Processing (ICCSP), 2017.
[15] R. Piyare and S. Lee, "Towards Internet of Things (IOT): Integration of Wireless Sensor Network to Cloud Services for Data Collection and Sharing," International Journal of Computer Networks & Communications, vol. 5, no. 5, pp. 59-72, 2013.