Loading

Assessment of the Various Techniques and Models Used To Secure the Applications of Internet of Things
Manu Raj Moudgil1, Anil Kumar Lamba2, Er.Priya Gupta3

1Dr.Manu Raj Moudgil, Professor, Department of Computer Science & Engineering, Chandigarh Group of Colleges, Technical Campus, Jhanjeri, Mohali. (Punjab), India.
2Dr.Anil Kumar Lamba, Professor & Head, Department of Computer Science & Engineering, Chandigarh Group of Colleges, Technical Campus, Jhanjeri, Mohali. (Punjab), India.
3Er.Priya Gupta, Assistant Professor, Department of Computer Science and Engineering, Aryabhatta Group of Institutions, Barnala,(Punjab), India.
Manuscript received on November 23, 2019. | Revised Manuscript received on December 15, 2019. | Manuscript published on December 30, 2019. | PP: 3334-3339 | Volume-9 Issue-2, December, 2019. | Retrieval Number:  B3745129219/2019©BEIESP | DOI: 10.35940/ijeat.B3745.129219
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In The Today’s Environment Digitization Plays A Vital Role In Daily Aspects Of Life And Mostly All The Appliances Are Digitally Connected And Smart In Operation That Grows Rapidly In All Over The World. For This, Iot Frameworks Is Mainly Applied And Utilized To Build Different Types Iot Applications. During The Formation Of Applications In Iot, Different Types Of Rules, Standards And Procedures Are Used Which Is Embedded In The Iot Framework. While Implementing The Privacy And Security In The Applications Needs A Variety Of Procedures And Mechanisms For Confirmations That All The Things Are Properly Working And Threat Avoidance. This Paper Focuses On Assessment Of Various Security Mechanisms Which Can Be Applied To Build An Iot Application. Also, The Pros And Cons Of Each Technique In The Domain Of Iot Application.
Keywords: Internet Of Things, Security Architecture, Security Mechanism.