Normal view MARC view ISBD view

E-third eye in an IoT smart-living: a systematic review

By: Chinaza, Olebara Comfort.
Publisher: Haryana IOSR - International Organization of Scientific Research 2022Edition: Vol.24(2), Mar-Apr.Description: 34-41p.Subject(s): Computer EngineeringOnline resources: Click here In: IOSR Journal of Computer Engineering (IOSR-JCE)Summary: The digital divide all over the world cannot be measured by the level of technical know-how alone. Many people get into the hype of new and trending technology, from Smart cars to Smart homes, syncing work, entertainment, and seeming security to a network that is one click away. This study is an attempt to expound on the extant features of digital knowledge, with respect to the security consciousness of tech users. The conglomeration of various IT hardware and software to form a "Smart effect" in homes, medical fields, campuses, and various enterprises is digitalization at its peak, as there are no boundaries between man, his machines, and his environment. Despite the comfort, entertainment, and cost-effectiveness of these solutions, this research digs in to evaluate its security implications through a review of various compromises captured in research. It also reviewed some proposed schemes aimed at proffering solutions to the endemic problem, with more focus on those that have been validated by research. Popular solutions include having responsible reporting by ethical hackers, Crowdsource and SmartCrowds, learning systems that classify, cluster, or set security policies for network monitoring, as well as proof of concept generated after carefully carrying out security analysis, which serves as a guide to device manufacturers. Finally, the researcher recommends that every smart network plan be accompanied by an appropriate security consultation and implementation, Companies offering smart solutions should have cyber security certified staff that will run vulnerability checks on their products before putting them on the market and also enlighten consumers on security best practices.
Tags from this library: No tags from this library for this title. Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Current location Call number Status Date due Barcode Item holds
Articles Abstract Database Articles Abstract Database School of Engineering & Technology
Archieval Section
Not for loan 2022-2083
Total holds: 0

The digital divide all over the world cannot be measured by the level of technical know-how alone. Many people
get into the hype of new and trending technology, from Smart cars to Smart homes, syncing work, entertainment,
and seeming security to a network that is one click away. This study is an attempt to expound on the extant features
of digital knowledge, with respect to the security consciousness of tech users. The conglomeration of various IT
hardware and software to form a "Smart effect" in homes, medical fields, campuses, and various enterprises is
digitalization at its peak, as there are no boundaries between man, his machines, and his environment. Despite
the comfort, entertainment, and cost-effectiveness of these solutions, this research digs in to evaluate its security
implications through a review of various compromises captured in research. It also reviewed some proposed
schemes aimed at proffering solutions to the endemic problem, with more focus on those that have been validated
by research. Popular solutions include having responsible reporting by ethical hackers, Crowdsource and
SmartCrowds, learning systems that classify, cluster, or set security policies for network monitoring, as well as
proof of concept generated after carefully carrying out security analysis, which serves as a guide to device
manufacturers. Finally, the researcher recommends that every smart network plan be accompanied by an
appropriate security consultation and implementation, Companies offering smart solutions should have cyber
security certified staff that will run vulnerability checks on their products before putting them on the market and
also enlighten consumers on security best practices.

There are no comments for this item.

Log in to your account to post a comment.

Click on an image to view it in the image viewer

Unique Visitors hit counter Total Page Views free counter
Implemented and Maintained by AIKTC-KRRC (Central Library).
For any Suggestions/Query Contact to library or Email: librarian@aiktc.ac.in | Ph:+91 22 27481247
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha