Internet of Things: A Perspective from Security and Privacy

deepika khambra


Internet of Thing is a kind of network in which sensors and actuators are new to sense different type of data in the form of text and images. Security of sensors takes important role because these devices connected through internet. A malware or a misbehaving device may break down the system or forge secure or personal information from sensor node. To avoid this kind of issues cryptographic techniques is used. These techniques are AES, DES and RSA. In this paper security issue of IoT has been presented. After that a relative study of dissimilar cryptographic algorithms has been presented.


Internet of Things (IoT), Sensor, Attack, Security, RSA, DES and AES

Full Text:



Ovidiu Vermesan SINTEF, Norway, Peter FriessEU, Belgium, “Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems”, Elesvier publishers’ series in communications, 2013.

Ovidiu Vermesan SINTEF, Norway, Peter FriessEU, Belgium, “Internet of Things–From Research and Innovation to Market Deployment”, Elesvier publishers’ series in communications, 2014.

Karen Rose, Scott Eldridge, Lyman Chapin, “The Internet of Things: An Overview Understanding the Issues and Challenges of a More Connected World”, The Internet Society (ISOC), 2015.

Xu Cheng, Minghui Zhang, Fuquan Sun, ”Architecture of internet of things and its key technology integration based-on RFID,” in 5thInternational Symposium on ComputationalIntelligence and Design, pp. 294-297, 2012.

Jose L. Hernandez-Ramos, Jorge Bernal Bernabe and Antonio F. Skarmeta, “Managing Context Information for Adaptive Security in IoT environments”, 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, pp: 676-681.

Minela Grabovica, Drazen Pezer, Srdan Popic and Vladimir Knezevic, “Provided security measures of enabling technologies in Internet of Things (IoT): A survey”, IEEE Conference 2016, pp: 28-31.

Mujahid Mohsin, Zahid Anwar, Ghaith Husariy, Ehab Al-Shaery and Mohammad Ashiqur Rahmanz, “IoTSAT: A Formal Framework for Security Analysis of the Internet of Things (IoT)”, IEEE Conference on Communications and Network Security (CNS)2016 pp: 1-9.

Jarkko Kuusijarvi, Reijo Savola, Pekka Savolainen and Antti Evesti, “Mitigating loT Security Threats with a Trusted Network Element”, The 11th International Conference for Internet Technology and Secured Transactions (ICITST-2016), IEEE pp:260-265.

Fisnik Dalipi and Sule Yildirim Yayilgan, “Security and Privacy Considerations for IoT Application on Smart Grids: Survey and Research Challenges”, 4th International Conference on Future Internet of Things and Cloud Workshops2016, pp:63-68.

Elisa Bertino, “Data Privacy for IoT Systems Concepts, Approaches, and Research Directions”, IEEE International Conference on Big Data (Big Data) 2016, pp:3645-3647.

Prasoon Raghav, Rahul Kumar and Rajat Parashar, “Securing Data in Cloud Using AES Algorithm”, International Journal of Engineering Science and Computing,2016, ISSN 2321 3361,pp: 3672-3675.

Priyesh Parikh, Satish N arkhede, “High performance implementation of Mixing of Column and inv Mixing of column for AES on FPGA”, International Conference on Computation of Power, Energy Information and Communication, IEEE2016, pp: 174-179.

S. Mary Sujatha and Y. Usha Devi, “Design and Implementation of IoT Testbed with Three Factor Authentication”, IEEE 2015, pp: 1-5.

Reinhard Behrens and Ali Ahmed “Internet of Things: An End-to-End Security Layer”, IEEE 2017, pp: 146-149.

Md Husamuddin and Mohammed Qayyum, “Internet of Things A Study on Security and Privacy Threats”, IEEE 2017, pp: 1-5.



  • There are currently no refbacks.

Copyright (c) 2017 International Journal of Advanced Research in Computer Science