Applications, Attacks and Authentication Schemes for Future IoT

  • Savitha* M
  • et al.
N/ACitations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The internet has gently penetrated and completely mushroomed in to our entire life activities. Still we give the impression to be extremely unimaginable about real fact for the reason that we are overflowing with the need for internet. This evolution has ended up in the necessity of extensive technological advancement. One among them is the concept of Internet of Things (IoT). IoT is a framework of computing appliances that are interrelated with the purpose of exchanging data over the network. Internet of Things is a structure in which day by day gadgets have turned up shrewder which in turn makes it possible for the each day operations to be smart and communications to be instructive. Any significant influence in the progress of the Internet of Things is essentially the consequence of the deeds that work together for a superior outcome conducted in various domains like social science, electronics, informatics and telecommunications. Consequently, this broad range of applications of IoT causes enormous volume of data sharing which in turn distributes the confidential data pertaining to the users. Hence the need for authentication of IoT devices is of significance to defend against the security attacks. In this paper, a detailed survey of Internet of Things which offers a comprehensive focus on the theory, architecture, applications and related research is presented.

Cite

CITATION STYLE

APA

Savitha*, Mrs. M., & Senthilkumar, Dr. M. (2020). Applications, Attacks and Authentication Schemes for Future IoT. International Journal of Innovative Technology and Exploring Engineering, 9(4), 2841–2848. https://doi.org/10.35940/ijitee.d1875.029420

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free