Publication Type : Conference Paper
Thematic Areas : Amrita Center for Cybersecurity Systems and Networks
Publisher : Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014: Volume 2, Advances in Intelligent Systems and Computing
Source : Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014: Volume 2, Advances in Intelligent Systems and Computing, Springer International Publishing, Volume 2, Number 328, Cham, p.85–95 (2015)
Url : http://dx.doi.org/10.1007/978-3-319-12012-6_10
ISBN : 9783319120126
Keywords : Heterogeneous devices, Internet of things, Middleware
Campus : Amritapuri
School : Centre for Cybersecurity Systems and Networks, Department of Computer Science and Engineering, School of Engineering
Center : Cyber Security
Department : Computer Science, cyber Security
Year : 2015
Abstract : Internet of Things (IoT) is indeed a novel technology wave that is bound to make its mark, where anything and everything (Physical objects) is able to communicate over an extended network using both wired and wireless protocols. The term “physical objects” means that any hardware device that can sense a real world parameter and can push the output based on that reading. Considering the number of such devices, volume of data they generate and the security concerns, not only from a communication perspective but also from its mere physical presence outside a secure/monitored vault demands innovative architectural approaches, applications and end user systems. A middleware platform/framework for IoT should be able to handle communication between these heterogeneous devices, their discoveries and services it offers in real time. A move from internet of computers to internet of anything and everything is increasing the span of security threats and risks. A comparative study of existing prominent IoT platforms will help in identifying the limitations and gaps thereby acting as the benchmark in building an efficient solution.
Cite this Research Publication : Shiju Sathyadevan, Kalarickal, B. S., and M. K. Jinesh, “Security, Trust and Implementation Limitations of Prominent IoT Platforms”, in Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014: Volume 2, Advances in Intelligent Systems and Computing, Cham, 2015, vol. 2, pp. 85–95.