IOT - Overview, Implementation and Upcoming Challenges
DOI:
https://doi.org/10.32628/CSEIT206628Keywords:
IoT, Data Integrity, LoRa , High Density Sensors, Ethureum BlockchainAbstract
IoT is a chain of Physical Objects that are installed with sensors, software, and other technologies for the goal of connecting and transferring data with other devices and systems over the Internet. In many research, it has been found that the data and communication between the Internet of Things are insecure. Also, the data which is transferred from one end to the other end is accessible for a shorts distance. A discovered protocol for Data Integrity in IoT communication. A protocol for providing an environmental monitoring solution and a system that facilitates the practical experimentation of the IoT solutions. After the data is secured with the protocols and it has received an environment for the experiments, the message has to be sent over a long distance.
References
- Gregory Falco, Arun Viswanathan, Carlos Caldera, and Howard Shrobe. A master attack methodology for an ai-based automated attack planner for smart cities. IEEE Access, pages 48360–48373, August 28, 2018. Shodan, (accessed April, 2018). www.shodan.io/.
- Jiyong Han, Minkeun Ha, and Daeyoung Kim. Practical security analysis for the constrained node networks: Focusing on the dtls protocol. 2015 5th International Conference on the Internet of Things (IOT), 2015.
- Andrew Minteer. Analytics for the Internet of Things (IoT).
- Iotchain: A blockchain security architecture for the internet of things. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC 2018), pages 1–6, April 2018.
- Riccardo Bonetto, Nicola Bui, Vishwas Lakkundi, Alexis Olivereau, Alexandru Serbanati, and Michele Rossi. Secure communication for smart iot objects: Protocol stacks, use cases and practical examples. 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2012.
- David Easley, Maureen O’Hara, and Soumya Basu. From mining to markets: The evolution of bitcoin transaction fees. (May 1, 2018). https://ssrn.com/abstract=3055380.
- Gregory Falco, Caleb Li, Pavel Fedorov, Carlos Caldera, Rahul Arora, and Kelly Jackson. Neuromesh: Iot security enabled by a blockchain powered botnet vaccine. ACM Proceedings: International Conference on Omni-Layer Intelligent Systems (COINS), 2019.
- Gregory Falco, Arun Viswanathan, Carlos Caldera, and Howard Shrobe. A master attack methodology for an ai-based automated attack planner for smart cities. IEEE Access, pages 48360–48373, August 28, 2018.
- Igor Fovino, Andrea Carcano, Thibault Murel, and Alberto Trombetta. Modbus/dnp3 state-based intrusion detection system. 2010 24th IEEE International Conference on Advanced Information Networking and Applications, 2010.
- Adam Gencer, Soumya Basul, Ittay Eyall, Robert van Renessel, and Emin Sirer. Decentralization in bitcoin and ethereum networks. arXiv preprint arXiv:1801.03998,2018.
- Popov Sergui. The tangle. 2015. https://iota.org/ IOTAWhitepaper.pdf.
- Zhengguo Sheng, Shusen Yang, Yifan Yu, Athanasios Vasilakos, Julie McCann, and Kin Leung. A survey on the ietf protocol suite for the internet of things: standards, challenges, and opportunities. IEEE Wireless Communications, pages 91–98, 2013.
- Dinesh Thangavel, Xiaoping Ma, Alvin Valera, Hwee- Xian Tan, and Colin Tan. Performance evaluation of mqtt and coap via a common middleware. 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2014.
- Gavin Wood. Ethereum (eth) – whitepaper. 2015. http: //gavwood.com/paper.pdf.
- Satoshi Nakamotoi. Bitcoin: A peer-to-peer electronic cash system. 2008. https://bitcoin.org/bitcoin.pdf.
- Iotex: A decentralized network for internet of things. 2018. https://iotex.io/white-paper.
- Our response to ‘a cryptocurrency without a blockchain has been built to outperform bitcoin. 2018
- Ethereum Blockchain App Platform, (Accessed: 2019-02- 13). https://www.ethereum.org.
- Assessment of Linguistics Web Technologies Based on Cyclic Sequential Access Structure, CIKITUSI JOURNAL FOR MULTIDISCIPLINARY RESEARCH, ISSN NO: 0975-6876, Advin Manhar, Mohammed Bakhtawar.
- F. D. Davis, “Perceived usefulness, perceived ease of use, and user acceptance of information technology,” MIS Quarterly, vol. 13, no. 3, pp. 319–340, 1989.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.