Journal Press India®

Analysis of Implementation Areas of IOT with Security Features

Vol 7 , Issue 1 , January - June 2024 | Pages: 56-64 | Research Paper  

https://doi.org/10.51976/jfsa.712408


Author Details ( * ) denotes Corresponding author

1. * Dheerendra Pratap Singh, Professor, Department of Mechanical Engineering, SR Institute of Management and Technology, Lucknow, Uttar Pradesh, India (Dheerendra.19732pratap@gmail.com)
2. Anurag Kumar, Assistant Professor, Computer Science & Engineering, Bhudelkhand University, Jhansi, Uttar Pradesh, India

Small wearables to large industrial systems—the Internet of Things (IoT) is radically altering modern living. Infrastructure and amenities that are ubiquitous, dependable, high performing, efficient, and scalable are needed for the Internet of Things. IoT services work with a wide range of devices, from simple to complicated technologies, and communication occurs through a variety of networks. Cloud computing is the most significant aspect of the Internet of Things since it not only connects servers, but it also analyzes critical data acquired from sensors while also providing sufficient storage space. Further organisation and resale data will be required in the near future to finish this attribution. Certain Internet of Things (IoT) applications facilitate process automation and allow non-living physical things to function without the need for human interaction. Internet of Things (IoT) applications in the industrial sector could boost productivity and enable more extensive networks of communication between workers and equipment. Ultimately, this would enable a greater number of competitive businesses to enter the market, which would improve quality control and reduce losses. This article discusses many technologies risks as well as their advantages and the many uses of IoT, including smart towns and cities, medical care, and industry.

Keywords

IoT, Security, RFID, WSN, Application, Radio frequency identification.

  1. Atlam, Hany F., and Gary B. Wills. “IoT security, privacy, safety and ethics.” Digital twin technologies and smart cities. Springer, Cham, 2020. 123-149.
  2. Alfandi, O., Khanji, S., Ahmad, L. et al. A survey on boosting IoT security and privacy through blockchain. Cluster Comput 24, 37–55 (2021). https://doi.org/10.1007/s10586-020-03137-8.
  3. Vaishali Yadav and V. K. Tomar, “A Low Leakage with enhance write margin 10T SRAM cell for IoT applications” published in oceedings of “International Conference on Micro/Nanoelectronics Devices, Circuits and Systems (MNDCS-2021), National Institute of Technology, Silchar, 30-31 January 2021. pp 201-211 Print ISBN: 978-981-16-3766-7, https://link.springer.com/chapter/10.1007/978-981-16-3767-4_19,Editors- Dr. Trupti Ranjan Lenka, Prof. Durgamadhab Misra, Prof. Dr. Arindam Biswas Publisher: Springer Singapore
  4. Thakurendra Singh and V. K. Tomar, “Post Simulation of High Speed Sense Amplifiers using  45 nm CMOS Technology Used in IOT application” 2nd International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC 2022) held during 21st -22nd January, 2022 organized by Department of Electrical Engineering, GLA University, Mathura, India DOI: 10.1109/PARC52418.2022.9726536
  5. 3. K. K. S. Gautam, R. Kumar, R. Yadav and P. Sharma, “Investigation of the Internet of Things (IoT) Security and Privacy Issues,” 2023 5th International Conference on Inventive Research in Computing Applications (ICIRCA), Coimbatore, India, 2023, pp. 1489-1494, doi: 10.1109/ICIRCA57980.2023.10220814.
  6. M. S. Rajan, J. R. Arunkumar, A. Ramasamy and B. Sisay, “A comprehensive study of the Design and Security of the IoT layer Attacks,” 2021 6th International Conference on Communication and Electronics Systems (ICCES), Coimbatre, India, 2021, pp. 538-543, doi: 10.1109/ICCES51350.2021.9489235.
  7. J. Singh, G. Singh and S. Negi, “Evaluating Security Principals and Technologies to Overcome Security Threats in IoT World,” 2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC), Salem, India, 2023, pp. 1405-1410, doi: 10.1109/ICAAIC56838.2023.10141083.
  8. Vivek Kumar and V. K. Tomar “A Comparative Performance Analysis of 6T,  7T and 8T SRAM Cells in 18nm FinFET Technology”, Presented in International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC 2020) on 28-29 Febuary,2020 at GLA University, Mathura .(PP-329-333) ISBN No- 978-1-7281-6576-9, DOI: 10.1109/PARC49193.2020.236620.
  9. V. Obarafor, M. Qi and L. Zhang, “A Review of Privacy-Preserving Federated Learning, Deep Learning, and Machine Learning IIoT and IoTs Solutions,” 2023 8th International Conference on Signal and Image Processing (ICSIP), Wuxi, China, 2023, pp. 1074-1078, doi: 10.1109/ICSIP57908.2023.10270935.
  10. N. Tewari and G. Datt, “A Systematic Review of Security Issues and challenges with Futuristic Wearable Internet of Things (IoTs),” 2021 International Conference on Technological Advancements and Innovations (ICTAI), Tashkent, Uzbekistan, 2021, pp. 319-323, doi: 10.1109/ICTAI53825.2021.9673353.
  11. Nižetić, Sandro, et al. “Internet of Things (IoT): Opportunities, issues and challenges towards a smart and sustainable future.” Journal of Cleaner Production 274 (2020): 122877.
  12. A. Sindgi, M. Adil and P. Chaudhary, “Automated Security Evaluations for IoT Deployments,” 2023 International Conference on Power Energy, Environment & Intelligent Control (PEEIC), Greater Noida, India, 2023, pp. 812-816, doi: 10.1109/PEEIC59336.2023.10451350.
  13. D. R. M S, R. A and A. Agarwal, “The Innovative Cloud Security Environment for Data Privacy,” 2023 International Conference on Power Energy, Environment & Intelligent Control (PEEIC), Greater Noida, India, 2023, pp. 748-751, doi: 10.1109/PEEIC59336.2023.10450434.
  14. Shukla, Aasheesh. “Optimal Multiple Access Scheme for 5G and Beyond Communication Network.” International Conference on Information and Communication Technology for Intelligent Systems. Springer, Singapore, 2020.
Abstract Views: 1
PDF Views: 53

Related Articles
Enhanced Cybersecurity Framework for 5G-Integrated Oil and Gas Industry
Daniel Dauda Wisdom, Olufunke Rebecca Vincent, Oduntan Odunayo Esther, Kingsley T. Igulu, Alpha Baba Garba
A Review of Best Practices and Methods of Mitigating Cybersecurity Risks in Healthcare Systems and a Newly Proposed Algorithm
Daniel D. Wisdom, Kingsley T. Igulu, Oduntan O. Esther, Garba A. Baba, Abdulmalik Ahmad, Abdullahi Sidi
Protection of Vehicular AdHoc Networks via Efficient Authentication and Message Encryption
Ms. Chindika Mulambia, Dr. Sudeep Varshney, Dr. Amrit Suman

By continuing to use this website, you consent to the use of cookies in accordance with our Cookie Policy.