Design a secure IoT Architecture using Smart Wireless Networks

Authors

  • Nourah Almrezeq
  • Lama Almadhoor
  • Thowg Alrasheed
  • A. A. Abd El-Aziz
  • Shadi Nashwan Associate professor in computer and network security. Computer Science Dep. College of Computer and Information Sciences. Jouf University, Saudi Arabia.

DOI:

https://doi.org/10.17762/ijcnis.v12i3.4877

Abstract

The Internet of Things (IOT) is a revolution in the technology world, and this field is continuously evolving. It has made life easier for people by providing consumers with more efficient and effective resources in faster and more convenient ways. The Internet of Things is one of the most exciting fields for the future by 2030. 90% of the planet will be connected and all devices in homes and businesses around us will be connected to the Internet making it more vulnerable to violations of privacy and protection. Due to the complexity of its environment, security and privacy are the most critical issues relevant to IoT. Without the reliable security of the devices, they will lose their importance and efficiency. Moreover, the security violation will outweigh any of its benefits. In this paper, an overview of various layered IoT architectures, a review of common security attacks from the perspective of the layer, and the best techniques against these attacks are provided. Moreover, an enhanced layered IoT architecture is proposed, which will be protected against several security attacks.

Author Biography

Shadi Nashwan, Associate professor in computer and network security. Computer Science Dep. College of Computer and Information Sciences. Jouf University, Saudi Arabia.

Associate professor Computer Science Dep. College of Computer and Information Sciences. Jouf University, Saudi Arabia.

Downloads

Published

2020-12-21 — Updated on 2022-04-16

Versions

How to Cite

Almrezeq, N., Almadhoor, L., Alrasheed, T., Abd El-Aziz, A. A., & Nashwan, S. (2022). Design a secure IoT Architecture using Smart Wireless Networks. International Journal of Communication Networks and Information Security (IJCNIS), 12(3). https://doi.org/10.17762/ijcnis.v12i3.4877 (Original work published December 21, 2020)

Issue

Section

Research Articles