{"title":"Internet of Things (IoT): Application systems and security vulnerabilities","authors":"Jinesh Ahamed, Amala V. Rajan","doi":"10.1109/ICEDSA.2016.7818534","DOIUrl":null,"url":null,"abstract":"IoT (Internet of Things) is a system where objects are embedded with sensor technology to interact with each other over wireless communication medium to generate, exchange and transfer data without human interaction. It provides interaction between physical world and cyber world which is known as cyber physical systems. IoT can be implemented as smart cities, smart homes, traffic management systems etc. Research has proven that, any system with the characteristics of remote management, dynamic topology, resource constraints and wireless communication medium are always susceptible to security issues. This research aims to investigate and identify the specific types of IoT applications suitable for UAE, analyse the potential security threats associated them and their impacts on these applications. A thorough exploration and review of the available literature has been done to identify the IoT application systems and related cyber vulnerabilities.","PeriodicalId":247318,"journal":{"name":"2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"36","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEDSA.2016.7818534","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 36
Abstract
IoT (Internet of Things) is a system where objects are embedded with sensor technology to interact with each other over wireless communication medium to generate, exchange and transfer data without human interaction. It provides interaction between physical world and cyber world which is known as cyber physical systems. IoT can be implemented as smart cities, smart homes, traffic management systems etc. Research has proven that, any system with the characteristics of remote management, dynamic topology, resource constraints and wireless communication medium are always susceptible to security issues. This research aims to investigate and identify the specific types of IoT applications suitable for UAE, analyse the potential security threats associated them and their impacts on these applications. A thorough exploration and review of the available literature has been done to identify the IoT application systems and related cyber vulnerabilities.
物联网(Internet of Things, IoT)是将物体嵌入传感器技术,通过无线通信媒介相互交互,产生、交换和传输数据,而无需人工交互的系统。它提供了物理世界和网络世界之间的相互作用,被称为网络物理系统。物联网可以实现为智慧城市,智能家居,交通管理系统等。研究表明,任何具有远程管理、动态拓扑、资源约束和无线通信介质等特点的系统都容易出现安全问题。本研究旨在调查和确定适合阿联酋的特定类型的物联网应用,分析与之相关的潜在安全威胁及其对这些应用的影响。对现有文献进行了彻底的探索和审查,以确定物联网应用系统和相关的网络漏洞。