Full Paper View Go Back

A Survey on Developing Secure IoT Products

Priyang Bhatt1 , Bhasker Thaker2 , Neel Shah3

  1. Gujarat Technological University, V. V Nagar, Anand , India.
  2. Dept. of ECE, G H Patel College of Engineering and Technology, V. V Nagar, Anand, India.
  3. TCR Advanced Engineering Pvt. Ltd., Vadodara, India.

Section:Survey Paper, Product Type: Isroset-Journal
Vol.6 , Issue.5 , pp.41-44, Oct-2018


CrossRef-DOI:   https://doi.org/10.26438/ijsrcse/v6i5.4144


Online published on Oct 31, 2018


Copyright © Priyang Bhatt, Bhasker Thaker, Neel Shah . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Priyang Bhatt, Bhasker Thaker, Neel Shah, “A Survey on Developing Secure IoT Products,” International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.5, pp.41-44, 2018.

MLA Style Citation: Priyang Bhatt, Bhasker Thaker, Neel Shah "A Survey on Developing Secure IoT Products." International Journal of Scientific Research in Computer Science and Engineering 6.5 (2018): 41-44.

APA Style Citation: Priyang Bhatt, Bhasker Thaker, Neel Shah, (2018). A Survey on Developing Secure IoT Products. International Journal of Scientific Research in Computer Science and Engineering, 6(5), 41-44.

BibTex Style Citation:
@article{Bhatt_2018,
author = {Priyang Bhatt, Bhasker Thaker, Neel Shah},
title = {A Survey on Developing Secure IoT Products},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {10 2018},
volume = {6},
Issue = {5},
month = {10},
year = {2018},
issn = {2347-2693},
pages = {41-44},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=859},
doi = {https://doi.org/10.26438/ijcse/v6i5.4144}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i5.4144}
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=859
TI - A Survey on Developing Secure IoT Products
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Priyang Bhatt, Bhasker Thaker, Neel Shah
PY - 2018
DA - 2018/10/31
PB - IJCSE, Indore, INDIA
SP - 41-44
IS - 5
VL - 6
SN - 2347-2693
ER -

623 Views    454 Downloads    191 Downloads
  
  

Abstract :
The Internet of Things (IoT) is a vision of a globally interconnected network of various sensors, actuators and embedded systems connected to each other via wired/wireless connections, interacting with the environment and each other to create value. This vision would revolutionize current models and processes in business and daily life. Needless to say being such an impactful concept, security in IoT becomes even more critical than before. In this we paper we survey and highlight some crucial and primary concepts related to IoT Security which have to be incorporated in the IoT system design and development as well as during deployment of the IoT applications.

Key-Words / Index Term :
IoT, Privacy, Security, Product Development, Secure Design

References :
[1] Developing Secure Products in the Age of IoT - Internet Of Things, https://electronicsofthings.com/research-articles/developing-secure-products-age-iot/.
[2] Tuhin Borgohain, Uday Kumar, Sugata Sanyal, “Survey of Security and Privacy Issues of Internet of Things,” https://arxiv.org/ftp/arxiv/papers/1501/1501.02211.pdf.
[3] A Whitepaper on The Internet of Things: Reduce Security Risks with Automated Policies, Cisco, https://www.cisco.com/c/dam/en_us/solutions/trends/iot/docs/security-risks.pdf.
[4] Security Requirements for Embedded Devices – What is Really Needed?, http://www.iconlabs.com/prod/security-requirements-embedded-devices-%E2%80%93-what-really-needed.
[5] Srivaths Ravi, Anand Raghunathan, Paul Kocher, Sunil Hattangady, “Security in Embedded Systems:Design Challenges,” http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.83.586&rep=rep1&type=pdf.
[6] FIPS PUB 140-2.Security Requirements for Cryptographic Modules.Available at http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf.
[7] i.MX 7Solo Processors - Heterogeneous Processing with Arm® Cortex®-A7 and Cortex-M4 cores, https://www.nxp.com/products/processors-and-microcontrollers/applications-processors/i.mx-applications-processors/i.mx-7-processors/i.mx-7solo-processors-heterogeneous-processing-with-arm-cortex-a7-and-cortex-m4-cores:i.MX7S.
[8] i.MX 7Solo Family of Applications Processors Datasheet, https://www.nxp.com/docs/en/data-sheet/IMX7SCEC.pdf.
[9] TrustZone – Arm, https://www.arm.com/products/security-on-arm/trustzone.
[10] TrustZone – Arm Developer, https://developer.arm.com/technologies/trustzone.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation