An Insight into Current IoT Security Methods

Authors

  • K.K. Yuen Tunku Abdul Rahman University College.
  • W.H. Shim Tunku Abdul Rahman University College.
  • T.T. Ting Tunku Abdul Rahman University College.
  • C.K. Teoh Tunku Abdul Rahman University College.

Keywords:

Framework, Internet-of-Things, Protocol, Security,

Abstract

This paper examines the security methods in the Internet-of-Things. The security methods are carefully studied and categorized into six layers according to the Internet-ofThings framework namely Event Producer and Consumer, Event Queuing System, Transformation and Analysis, Storage, Presentation and Action, and Users and Systems. It can be observed that most security methods emphasizes on Event Producer and Consumer layer whereas the least focused layer is Users and Systems layer. This study aims to present a comprehensive overview to researchers working in the domain of the Internet-of-Things security.

Downloads

Published

2018-02-05

How to Cite

Yuen, K., Shim, W., Ting, T., & Teoh, C. (2018). An Insight into Current IoT Security Methods. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 10(1-6), 121–125. Retrieved from https://jtec.utem.edu.my/jtec/article/view/3678