Smart City Gnosys

Smart city article details

Title Security Vulnerabilities And Issues Of Traditional Wireless Sensors Networks In Iot
ID_Doc 47996
Authors Chander B.; Gopalakrishnan K.
Year 2019
Published Intelligent Systems Reference Library, 174
DOI http://dx.doi.org/10.1007/978-3-030-33596-0_21
Abstract From the past decade, Wireless sensor networks (WSNs) spread out significantly with the result of technological progress in hardware, software, and micro electro mechanical systems. With the enlargement of WSNs, great advances have been shaped in Internet-of-Things (IoT) by an ample variety of applications. IoT applications practiced in myriad phases include human life, ecological supervise, public wellbeing and medical behavior, smart shipping, traffic monitoring, smart cities, smart home applications, smart grid, and others. Mostly Internet of Things maintained with various sensing devices and technologies such as Sensors, GPS (Global positioning system), laser sensor, gas inductor, RFID (Radio-frequency identification devices), infrared sensor and many more, which collects large range features from the real world and send abstract feature objects which need to be monitored. Most of the devices are linked and interacted with more than one. The main idea behind IoT is to connect device-to-device, device-to-human, human-to-human. Development of IoT can make people live in a convenient way; however, it does not make sure the security of secret confidential information of its user. With a great collection of distribution, responsiveness and somewhat high processing capacity of IoT objects formed them as an optimal objective for cyber-attacks. So here some probabilities, secret confidential information may be a leak or stolen some point in time. Just once a sign of IoT device is captured or suspended it intention straightforwardly perturbs the security about whole information of IoT. Moreover, enormous IoT nodes accumulate a large amount of extensive prosperous, private information and process it, so its like lottery for cyber attackers to steal entire important data. Security obstacles like privacy, secure communication, access control, safe storage of data are becoming important tackles in the IoT domain. Hence, each solitary node that we positioned, each solitary device that we discover, each solitary byte that generated within the sphere of an IoT domain, at some point of time comes under inspection in the course of the investigation. An IoT not including proper premeditated solutions for security issues it will principally limit its improvement. So securities, in particular, the ability to detect malicious nodes with preserving support of malicious activities appear as a priority in the successful employment of IoT networks. IoT has three dissimilar layers, each layers security approaches along with defensive methods are briefly described. Blockchain technology will progress the integrity in the real world shared data sets. Primarily blockchain applied in support of recording fiscal transactions where connections encoded (pre-arranged) and kept back with participants, on one occasion transaction confirmed by blockchain it cannot be modeled or else wipe out; if any modification is applied it is easy to map out and recognize. Blockchain technology position in IoT security, challenges, and Research problems in brief discussed. © Springer Nature Switzerland AG 2020.
Author Keywords Black chain; Integrity; Internet of Things; Key management; Security; Security measures; WSN


Similar Articles


Id Similarity Authors Title Published
47990 View0.9Sharma R.; Arya R.Security Threats And Measures In The Internet Of Things For Smart City Infrastructure: A State Of ArtTransactions on Emerging Telecommunications Technologies, 34, 11 (2023)
33253 View0.899Oluwalola F.K.; Oluyemi D.Introduction Of Security And Privacy Issues For Iot And WsnSecurity and Privacy Issues for IoT and WSN-based Real-time Applications (2025)
18302 View0.895Choudhary V.; Tanwar S.; Rana A.Demystifying Security And Applications Of Internet Of Things2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions), ICRITO 2021 (2021)
47934 View0.893Padmavathi V.; Saminathan R.Security For The Internet Of ThingsComputer and Information Security Handbook, Fourth Edition: Volumes 1-2, 1 (2024)
47858 View0.889Chanal P.M.; Kakkasageri M.S.Security And Privacy In Iot: A SurveyWireless Personal Communications, 115, 2 (2020)
8663 View0.883Reddy D.M.K.; Sathya R.; Lakshmi Y.V.A.S.An Investigative Study On Different Security Aspects Of Wireless Sensor NetworksLecture Notes in Networks and Systems, 1227 LNNS (2025)
47885 View0.882Koshy A.S.; Fatima N.; Agarwal P.; Rodrigues J.J.P.C.Security And Privacy Threats In Iot-Enabled Smart CitiesInternet of Things (2022)
47868 View0.881Tolani M.; Balodi A.; Bajpai A.; Jain V.; Kovintavewat P.Security And Privacy Issues For Iot And Wsn-Based Real-Time ApplicationsSecurity and Privacy Issues for IoT and WSN-based Real-time Applications (2025)
47917 View0.879Rakhi S.; Sampada H.K.; Bhaskar M.K.; Kausar F.; Balodi A.Security Concerns Of Iot/Wsn For Real-Time ApplicationsSecurity and Privacy Issues for IoT and WSN-based Real-time Applications (2025)
33339 View0.878Pundir S.; Wazid M.; Singh D.P.; Das A.K.; Rodrigues J.J.P.C.; Park Y.Intrusion Detection Protocols In Wireless Sensor Networks Integrated To Internet Of Things Deployment: Survey And Future ChallengesIEEE Access, 8 (2020)