11 The basic authentification process requires user interactions and displays different screens. After [52]. 

11 The basic authentification process requires user interactions and displays different screens. After [52]. 

Source publication
Thesis
Full-text available
Every day gigantic amounts of digital data are produced by billions of devices around the globe. Using this kind of data and develop applications of unlimited possibilities have created the Internet of Things (IoT) idea. Furthermore, wearable devices have taken up the recognition not only for private users, but also medical device producers and sta...

Citations

... Fig. 20 delineates 3-layer architecture of IoT (Bing, 2016). Fig. 21 visualizes the 7-layer architecture of IoT (Tietz, 2016). This work has considered the most prominent and accepted 4-layer architecture (in Fig. 22). ...
Article
The IoT is the upcoming one of the major networking technologies. Using the IoT, different items or devices can be allowed to continuously generate, obtain, and exchange information. Different IoT applications nowadays are centered on computerizing various errands and are attempting to engage the inanimate physical items to act without direct supervision of a human. The current and forthcoming IoT services are exceptionally encouraging to build the degree of solace, proficiency, and automation for the clients. To obtain the option to actualize such a world in a continuously developing manner requires high security, protection, verification, and recuperation from assaults. Right now, incorporating the requisite changes in IoT systems engineering to achieve end-to-end, stable IoT infrastructure is paramount. In this research, a comprehensive analysis is incorporated into the security-relevant problems and threat wellsprings in IoT resources or applications. Specific that and current advancements based on maintaining a high degree of confidence in IoT apps are addressed while looking at the security issues. Four distinct developments are investigated, including cryptography, fog computing, edge computing, and ML (Machine Learning), to extend the degree of IoT security.