Chapter 10

An Introduction to Security in Internet of Things (IoT) and Big Data

Sushree Bibhuprada B. Priyadarshini

Sushree Bibhuprada B. Priyadarshini

Department of Computer Science & Information Technology, Siksha ‘O’ Anusandhan (Deemed to be University), Bubaneswar, India

Search for more papers by this author
Suraj Kumar Dash

Suraj Kumar Dash

Department of Computer Science & Information Technology, Siksha ‘O’ Anusandhan (Deemed to be University), Bubaneswar, India

Search for more papers by this author
Amrit Sahani

Amrit Sahani

Department of Computer Science & Information Technology, Siksha ‘O’ Anusandhan (Deemed to be University), Bubaneswar, India

Search for more papers by this author
Brojo Kishore Mishra

Brojo Kishore Mishra

Department of Computer Science & Engineering, GIET University, Gunupur, India

Search for more papers by this author
Mahendra Prasad Nath

Mahendra Prasad Nath

Department of Computer Science & Information Technology, Siksha ‘O’ Anusandhan (Deemed to be University), Bubaneswar, India

Search for more papers by this author
First published: 30 November 2022

Summary

The basics of Internet of Things (IoT) is the attribute of Internet of Objects, expected as a flexible strategy for giving several facilities. Condensed clever units create a critical phase of IoT. They vary extensively in practice, volume, service facility, and calculation strength. However, the incorporation of these clever matters in the widespread internetworking proposed IoT of safety threat due to the act the most internetwork technologies along with verbal exchange manners that had not been now designed to guide IoT. Furthermore, the trade of IoT has produced public safety matter, such as nonpublic secrecy issues, risk of cyber threats, and trained crime. Have guidelines or suggestions on the analysis of IoT security and contribute to improvement. This control offers full information of the open penetration and retrieval as opposed to the IoT edge side layer, which are done in three phases: edge nodes, transmission, and edge computing. The method to reach this target, first, we quickly define those popular IoT recommendation models and outline protection in the IoT's framework. We also talk about the feasible purposes of IoT and the inspiration of the intruder and set new goals in this new model. With such rise in IoT and with the advent of ongoing digital applications, huge amount of data is produced each and every day, leading to the emergence of the term big data. In this chapter, we will be collaborating the detailed security study in case of IoT and big data.

The full text of this article hosted at iucr.org is unavailable due to technical difficulties.