Browse by author
Lookup NU author(s): Dr Deepak Puthal,
Professor Raj Ranjan
Full text for this publication is not currently held within this repository. Alternative links are provided below where available.
© 2018, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. The Internet of Things (IoT) introduces a future vision where users, computer, computing devices and daily objects possessing sensing and actuating capabilities cooperate with unprecedented convenience and benefits. We are moving towards IoT trend, where the number of smart sensing devices deployed around the world is growing at a rapid speed. With considering the number of sources and types of data from smart sources, the sensed data tends to new trend of research i.e. big data. Security will be a fundamental enabling factor of most IoT applications and big data, mechanisms must also be designed to protect communications enabled by such technologies. This paper analyses existing protocols and mechanisms to secure the IoT and big data, as well as security threats in the domain. We have broadly divided the IoT architecture into several layers to define properties, security issues and related works to solve the security concerns.
Author(s): Puthal D, Ranjan R, Nepal S, Chen J
Publication type: Conference Proceedings (inc. Abstract)
Publication status: Published
Conference Name: Cloud Infrastructures, Services, and IoT Systems for Smart Cities: Second EAI International Conference (IISSC 2017 and CN4IoT 2017)
Year of Conference: 2018
Online publication date: 27/10/2017
Acceptance date: 02/04/2016
Publisher: Springer Verlag
Library holdings: Search Newcastle University Library for this item
Series Title: Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering