Figure - uploaded by Mohammad Muzammil Khan
Content may be subject to copyright.
Five-layer architecture of IoT

Five-layer architecture of IoT

Source publication
Chapter
Internet of Things (IoT) devices are growing to be more than 20 billion by the end of 2020. IoT devices were evolved from wireless sensor networks (WSNs). IoT devices are applicable in numerous scientific fields and hence becoming a universal application for every need. Industry 4.0 is a result of the ever-growing IoT network. In IoT, sensor nodes...

Citations

... We only prevent our data from attackers like (delete unused memory storage; change passwords, hide their encryption keys and modem wires) Security and Communication Networks protection of IoT devices [62]. Different requirements and problems can have an impact on the ability of devices and their protections. ...
... Professionals can remotely fix operating system issues or deploy essential updates on their devices. However, hackers can subvert these features to break data encryption [62]. (iv) Automation ...
... In IoT applications, system application developers use different features to collect data and streamline business processes. Artificially intelligent methods can access these features if the dangers are not specified through proper integration, which can allow dangers to compromise the system [62]. (v) Remote access IoT systems use different hosts for different protocols for remote access, such as area networks, Lurton, Bluetooth, and Z-Wave, although typically explicit limits are not indicated. ...
Article
Full-text available
Internet of Things (IoT) protection refers to the software field related to securing the Internet of Things and associated linked devices and systems. The IoT is a system of interconnected computers, sensors, actuators, or people on the World Wide Web (WWW). All these different devices have a unique identity in the IoT and must convey data across the network automatically. If computers are not adequately secured, allowing them to connect to the Internet exposes them to a range of serious vulnerabilities. Because the consequences of IoT failures are severe, it is necessary to observe and analyze security issues related to IoT. The prime goal of IoT security is to protect personal safety, while also guaranteeing and ensuring accessibility. In the context of IoT technology, the present study conducts a systematic literature review that analyzes the security problems associated with commercial and educational applications of home automation and details the technical possibilities of IoT with respect to the network layer. In this systematic review, we discuss how current contexts result in the inability of designers of IoT devices to enhance their cyber-security initiatives. Typically, application developers are responsible for training themselves to understand recent security advancements. As a result, active participation on the ridge scale with passive improvement can be achieved. A comparative analysis of the literature was conducted. The main objective of this research is to provide an overview of current IoT security research in home automation, particularly those using authentication methods in different devices, and related technologies in radio frequency identification (RFID) on network layers. IoT security issues are addressed, and various security problems in each layer are analyzed. We describe cross-layer heterogeneous integration as a domain of IoT and demonstrate how it can provide some promising solutions.