Full Paper View Go Back
A Survey on Developing Secure IoT Products
Priyang Bhatt1 , Bhasker Thaker2 , Neel Shah3
- Gujarat Technological University, V. V Nagar, Anand , India.
- Dept. of ECE, G H Patel College of Engineering and Technology, V. V Nagar, Anand, India.
- TCR Advanced Engineering Pvt. Ltd., Vadodara, India.
Section:Survey Paper, Product Type: Isroset-Journal
Vol.6 ,
Issue.5 , pp.41-44, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijsrcse/v6i5.4144
Online published on Oct 31, 2018
Copyright © Priyang Bhatt, Bhasker Thaker, Neel Shah . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Priyang Bhatt, Bhasker Thaker, Neel Shah, “A Survey on Developing Secure IoT Products,” International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.5, pp.41-44, 2018.
MLA Style Citation: Priyang Bhatt, Bhasker Thaker, Neel Shah "A Survey on Developing Secure IoT Products." International Journal of Scientific Research in Computer Science and Engineering 6.5 (2018): 41-44.
APA Style Citation: Priyang Bhatt, Bhasker Thaker, Neel Shah, (2018). A Survey on Developing Secure IoT Products. International Journal of Scientific Research in Computer Science and Engineering, 6(5), 41-44.
BibTex Style Citation:
@article{Bhatt_2018,
author = {Priyang Bhatt, Bhasker Thaker, Neel Shah},
title = {A Survey on Developing Secure IoT Products},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {10 2018},
volume = {6},
Issue = {5},
month = {10},
year = {2018},
issn = {2347-2693},
pages = {41-44},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=859},
doi = {https://doi.org/10.26438/ijcse/v6i5.4144}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i5.4144}
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=859
TI - A Survey on Developing Secure IoT Products
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Priyang Bhatt, Bhasker Thaker, Neel Shah
PY - 2018
DA - 2018/10/31
PB - IJCSE, Indore, INDIA
SP - 41-44
IS - 5
VL - 6
SN - 2347-2693
ER -
Abstract :
The Internet of Things (IoT) is a vision of a globally interconnected network of various sensors, actuators and embedded systems connected to each other via wired/wireless connections, interacting with the environment and each other to create value. This vision would revolutionize current models and processes in business and daily life. Needless to say being such an impactful concept, security in IoT becomes even more critical than before. In this we paper we survey and highlight some crucial and primary concepts related to IoT Security which have to be incorporated in the IoT system design and development as well as during deployment of the IoT applications.
Key-Words / Index Term :
IoT, Privacy, Security, Product Development, Secure Design
References :
[1] Developing Secure Products in the Age of IoT - Internet Of Things, https://electronicsofthings.com/research-articles/developing-secure-products-age-iot/.
[2] Tuhin Borgohain, Uday Kumar, Sugata Sanyal, “Survey of Security and Privacy Issues of Internet of Things,” https://arxiv.org/ftp/arxiv/papers/1501/1501.02211.pdf.
[3] A Whitepaper on The Internet of Things: Reduce Security Risks with Automated Policies, Cisco, https://www.cisco.com/c/dam/en_us/solutions/trends/iot/docs/security-risks.pdf.
[4] Security Requirements for Embedded Devices – What is Really Needed?, http://www.iconlabs.com/prod/security-requirements-embedded-devices-%E2%80%93-what-really-needed.
[5] Srivaths Ravi, Anand Raghunathan, Paul Kocher, Sunil Hattangady, “Security in Embedded Systems:Design Challenges,” http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.83.586&rep=rep1&type=pdf.
[6] FIPS PUB 140-2.Security Requirements for Cryptographic Modules.Available at http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf.
[7] i.MX 7Solo Processors - Heterogeneous Processing with Arm® Cortex®-A7 and Cortex-M4 cores, https://www.nxp.com/products/processors-and-microcontrollers/applications-processors/i.mx-applications-processors/i.mx-7-processors/i.mx-7solo-processors-heterogeneous-processing-with-arm-cortex-a7-and-cortex-m4-cores:i.MX7S.
[8] i.MX 7Solo Family of Applications Processors Datasheet, https://www.nxp.com/docs/en/data-sheet/IMX7SCEC.pdf.
[9] TrustZone – Arm, https://www.arm.com/products/security-on-arm/trustzone.
[10] TrustZone – Arm Developer, https://developer.arm.com/technologies/trustzone.
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at support@isroset.org or view contact page for more details.