Assessment of the Various Techniques and Models Used To Secure the Applications of Internet of Things

  • et al.
N/ACitations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In The Today’s Environment Digitization Plays A Vital Role In Daily Aspects Of Life And Mostly All The Appliances Are Digitally Connected And Smart In Operation That Grows Rapidly In All Over The World. For This, Iot Frameworks Is Mainly Applied And Utilized To Build Different Types Iot Applications. During The Formation Of Applications In Iot, Different Types Of Rules, Standards And Procedures Are Used Which Is Embedded In The Iot Framework. While Implementing The Privacy And Security In The Applications Needs A Variety Of Procedures And Mechanisms For Confirmations That All The Things Are Properly Working And Threat Avoidance. This Paper Focuses On Assessment Of Various Security Mechanisms Which Can Be Applied To Build An Iot Application. Also, The Pros And Cons Of Each Technique In The Domain Of Iot Application.

Cite

CITATION STYLE

APA

Moudgil, M. R., Lamba, A. K., & Gupta, Er. P. (2019). Assessment of the Various Techniques and Models Used To Secure the Applications of Internet of Things. International Journal of Engineering and Advanced Technology, 9(2), 3334–3339. https://doi.org/10.35940/ijeat.b3745.129219

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free