About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
ew 22(37): e5

Research Article

An overview of security issues in Internet of Things based smart environments

Download1132 downloads
Cite
BibTeX Plain Text
  • @ARTICLE{10.4108/eai.15-6-2021.170235,
        author={M.V. Hari Vinayak and T. Jarin},
        title={An overview of security issues in Internet of Things based smart environments},
        journal={EAI Endorsed Transactions on Energy Web},
        volume={9},
        number={37},
        publisher={EAI},
        journal_a={EW},
        year={2021},
        month={6},
        keywords={wireless sensor networks, Internet of Things, security threats, blockchain, fog computing, edge computing, machine learning},
        doi={10.4108/eai.15-6-2021.170235}
    }
    
  • M.V. Hari Vinayak
    T. Jarin
    Year: 2021
    An overview of security issues in Internet of Things based smart environments
    EW
    EAI
    DOI: 10.4108/eai.15-6-2021.170235
M.V. Hari Vinayak1, T. Jarin1,*
  • 1: Jyothi Engineering College, Thrissur, India
*Contact email: jeroever2000@gmail.com

Abstract

Wireless Sensor Network (WSN) and Internet of Things (IoT) together have the potential to change the whole world into a smart planet. IoT technology has been a huge boon for a clean, green, and sustainable environment. This technology benefits numerous industries by improving connectivity and reducing energy wastage. IoT has the potential to make our environment more sustainable and help us to reduce pollution all across the globe. But due to limited resources in both these networks, it is very challenging to form a complete secure system. This survey paper examines the various security requirements and attacks possible in WSN and IoT. The paper surveys existing approaches like blockchain, fog/edge computing and machine learning to ensure security of IoT systems. The paper also evaluates the performance of common machine learning algorithms using IoT datasets.

Keywords
wireless sensor networks, Internet of Things, security threats, blockchain, fog computing, edge computing, machine learning
Received
2021-02-24
Accepted
2021-06-13
Published
2021-06-15
Publisher
EAI
http://dx.doi.org/10.4108/eai.15-6-2021.170235

Copyright © 2021 M.V. Hari Vinayak et al., licensed to EAI. This is an open access article distributed under the terms of the Creative Commons Attribution license, which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.

EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL