Volume 2 , Issue 1 , PP: 24-33, 2023 | Cite this article as | XML | Html | PDF | Full Length Article
Sandy Montajab Hazzouri 1 *
Doi: https://doi.org/10.54216/PMTCS.020103
With the great acceleration in the world of digital technology and communications, the globe has turned into a virtual world connected, A new term has appeared, namely the Internet of Things, which refers to a kind of network to connects anything to the Internet based on the protocols prescribed Sensors conduct information exchange and communication to realize intelligent identification, Positioning, Tracking, Monitoring, and management. In this paper, we briefly discussed what the Internet of Things is, its applications, characteristics, and structure.
Internet of Things , communication , monitoring , identification
[1]. O. Vermesan, P. Friess, "Internet Of Things -from research and innovation to market deployment", River Publisher Series communication, 2014.
[2]. V. Bhuvaneswari, and R Porkodi “The Internet of Things (IoT) Applications and Communication Enabling Technology Standards: An Overview,” IEEE. Computer Science, International Conference on Intelligent Computing Applications, 2014.
[3]. K. K Patel, S. M Patel, "Internet of Things-IOT: Definition, Characteristics, Architecture, Enabling Technologies, Application & Future Challenges", May 2016.
[4]. G. D. Amane, ،،An Overview of Internet of Things’’, 13th international conference on recent innovations in science, engineering and management, February 2018.
[5]. A. Grizhnevich (2021), ،،IoT for Smart Cities: Use Cases and Implementation Strategies’’, [Online]. Available:
http://www.scnsofet.com/blog/iot-fpr-smart -city-use-cases-approaches-outcomes.
[6]. F. Righetti, C. Vallati, G. Anastasi, “IoT Applications in Smart Cities: A Perspective Into Social and Ethical Issues”, IEEE International Conference on Smart Computing, 2018.
[7]. (2021), [Online] Available:
https://www.ida.gov.sg/~/media/Files/Infocomm%20 Landscape/Technology/Technology Roadmap/Internet OfThings.pdf
[8]. J. Anca, R. Pasika and X. Lina. "Introduction to IoT Security". ch2 in the book: IoT Security: Advances in Authentication, Publisher: John Wiley Sons Ltd. 2019.
[9]. M. Abomhara and G. M. Koien, “Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks,” Journal of Cyber Security and Mobility, vol. 4, no. 1, pp. 65–88, 2015.
[10]. M. Gloukhvtsev,” IOT Security: Challenges, Solutions & Future Prospects”, DELLEMC, 2018.
[11]. R. Williams, E. McMahon, S. Samtani, M. Patton, and H. Chen, "Identifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approach", 2017 IEEE International Conference on Intelligence and Security Informatics (ISI), 2017.
[12]. X. Lu, Z. Qu, Q. Li, and P. Hui, Privacy Information security Classification for Internet of Things based on Internet Data". International Journal of Distributed Sensor Networks. 11(8), 2015.
[13]. J. Kannaiappan and B. Rajendran, "Privacy in the Internet of things". In Lee (ed.). The Internet of Things in the modern environment. IGI. Global. 2017.
[14]. F. Alaba, M. Othman, I. Hashem and F. Alotaibi, “Internet of Things security: A survey”, Journal of Network and Computer Applications, 88, pp.10-28, 2017.
[15]. M. Stamp, Information security, 2nd ed. Hoboken, N.J.: Wiley, 2011, pp. 227-278.
[16]. S. Ansari, S. Rajeev, and H. Chandrashekar, “Packet sniffing: a brief introduction,” Potentials, IEEE, vol. 21, no. 5, pp. 17–19, 2002.