IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Middleware Approach to Enhance the Security and Privacy in the Internet of Things

Middleware Approach to Enhance the Security and Privacy in the Internet of Things
View Sample PDF
Author(s): Vikash (Indian Institute of Information Technology, Allahabad, India), Lalita Mishra (Indian Institute of Information Technology, Allahabad, India)and Shirshu Varma (Indian Institute of Information Technology, Allahabad, India)
Copyright: 2020
Pages: 24
Source title: Security and Privacy Issues in Sensor Networks and IoT
Source Author(s)/Editor(s): Priyanka Ahlawat (National Institute of Technology, Kurukshetra, India)and Mayank Dave (National Institute of Technology, Kurukshetra, India)
DOI: 10.4018/978-1-7998-0373-7.ch007

Purchase

View Middleware Approach to Enhance the Security and Privacy in the Internet of Things on the publisher's website for pricing and purchasing information.

Abstract

Internet of things is one of the most rapidly growing research areas. Nowadays, IoT is applicable in various diverse areas because of its basic feature i.e., anything would be available to anyone at anytime. Further, IoT aims to provide service in a pervasive environment, although different problems crop up when the researchers move towards pervasiveness. Security and Privacy are the most intense problems in the field of IoT. There are various approaches available to handle these issues: Architectural security, Database security, Secure communication, and Middleware approaches. This chapter's authors concentrate on middleware approach from the security and privacy perceptive. Middleware can provide security by separating the end user from the actual complex system. Middleware also hides the actual complexity of the system from the user. So, the user will get the seamless services with no threats to security or privacy. This chapter provides a brief overview of secure middlewares and suggests the current research gaps as future directions.

Related Content

Pankaj Bhambri, Alex Khang. © 2024. 17 pages.
Ushaa Eswaran, Vivek Eswaran, Keerthna Murali, Vishal Eswaran. © 2024. 27 pages.
Punam Rattan, Geeta Sharma, Pavitar Prakash Singh. © 2024. 24 pages.
J. Avanija, C. Rajyalakshmi, K. Reddy Madhavi, B. Narendra Kumar Rao. © 2024. 14 pages.
Sajida Mustafa, Rehan Mehmood Sabir, Abid Sarwar, Muhammad Safdar, Mohammed Saleh Al Ansari, Saddam Hussain. © 2024. 26 pages.
Muhammad Fawaz Saleem, Ali Raza, Rehan Mehmood Sabir, Muhammad Safdar, Muhammad Faheem, Mohammed Saleh Al Ansari, Saddam Hussain. © 2024. 29 pages.
Kashif Ali, Zuhaib Nishtar, Rehan Mehmood Sabir, Muhammad Safdar. © 2024. 20 pages.
Body Bottom