{"title":"物联网中的安全审查","authors":"F. Ali, Muhammad S. Khan, Hassan Akhtar","doi":"10.11648/j.iotcc.20190703.14","DOIUrl":null,"url":null,"abstract":"In this decade, the exceedingly rising state of the art industry is internet of things where trillion devices will be connected. IoT is being appraised to transform the concept of communication. To support this paradigm shift, companies and organizations are endowing worthwhile attention with researchers and scholars. Internet of thing is lending a hand with its essential role to build a new and smart world in a smarter way where everything will be under the umbrella of it. The internet of things enables an overwhelming smartness to help the humankind with various entities and diverse applications. Although, it is greatest achievement in this decade but some prevails are being engendered calamitous situations with subject to security concerns such as threats, vulnerabilities, attacks in internet of things with its connected and inter-connected devices and objects. Some hazards are critically perilous and alarming to internet of things such as physical attacks, network attack, encryption attacks, software attacks, authorization, surveillance, identity theft, vandalism, secure communication and so on. The most salient concern and important part on internet of things is secure architecture of internet of things. In near future with the connectivity of billion or trillion devices, it would be very difficult to resolve the security issues for impending generations. In this paper, we reviewed different security architecture of IoT and highlighted the absence of security layer in all models.","PeriodicalId":173948,"journal":{"name":"Internet of Things and Cloud Computing","volume":"76 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Security Review in Internet of Things\",\"authors\":\"F. Ali, Muhammad S. Khan, Hassan Akhtar\",\"doi\":\"10.11648/j.iotcc.20190703.14\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this decade, the exceedingly rising state of the art industry is internet of things where trillion devices will be connected. IoT is being appraised to transform the concept of communication. To support this paradigm shift, companies and organizations are endowing worthwhile attention with researchers and scholars. Internet of thing is lending a hand with its essential role to build a new and smart world in a smarter way where everything will be under the umbrella of it. The internet of things enables an overwhelming smartness to help the humankind with various entities and diverse applications. Although, it is greatest achievement in this decade but some prevails are being engendered calamitous situations with subject to security concerns such as threats, vulnerabilities, attacks in internet of things with its connected and inter-connected devices and objects. Some hazards are critically perilous and alarming to internet of things such as physical attacks, network attack, encryption attacks, software attacks, authorization, surveillance, identity theft, vandalism, secure communication and so on. The most salient concern and important part on internet of things is secure architecture of internet of things. In near future with the connectivity of billion or trillion devices, it would be very difficult to resolve the security issues for impending generations. In this paper, we reviewed different security architecture of IoT and highlighted the absence of security layer in all models.\",\"PeriodicalId\":173948,\"journal\":{\"name\":\"Internet of Things and Cloud Computing\",\"volume\":\"76 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-10-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Internet of Things and Cloud Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.11648/j.iotcc.20190703.14\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Internet of Things and Cloud Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.11648/j.iotcc.20190703.14","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In this decade, the exceedingly rising state of the art industry is internet of things where trillion devices will be connected. IoT is being appraised to transform the concept of communication. To support this paradigm shift, companies and organizations are endowing worthwhile attention with researchers and scholars. Internet of thing is lending a hand with its essential role to build a new and smart world in a smarter way where everything will be under the umbrella of it. The internet of things enables an overwhelming smartness to help the humankind with various entities and diverse applications. Although, it is greatest achievement in this decade but some prevails are being engendered calamitous situations with subject to security concerns such as threats, vulnerabilities, attacks in internet of things with its connected and inter-connected devices and objects. Some hazards are critically perilous and alarming to internet of things such as physical attacks, network attack, encryption attacks, software attacks, authorization, surveillance, identity theft, vandalism, secure communication and so on. The most salient concern and important part on internet of things is secure architecture of internet of things. In near future with the connectivity of billion or trillion devices, it would be very difficult to resolve the security issues for impending generations. In this paper, we reviewed different security architecture of IoT and highlighted the absence of security layer in all models.