
Please use this identifier to cite or link to this item:
http://ir.lib.seu.ac.lk/handle/123456789/7924Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Muhammed Rijah, Uthuma Lebbe | - |
| dc.contributor.author | Mohamed Riyath, Mohamed Ismail | - |
| dc.contributor.author | Jiffriya, Mohamed Abdul Cader | - |
| dc.date.accessioned | 2026-05-12T07:08:44Z | - |
| dc.date.available | 2026-05-12T07:08:44Z | - |
| dc.date.issued | 2021-11-17 | - |
| dc.identifier.citation | Journal of Information Systems & Information Technology (JISIT) ; Vol. 6 No.2, 2021; Pp 10- 27. | en_US |
| dc.identifier.issn | 2478-0677 | - |
| dc.identifier.uri | http://ir.lib.seu.ac.lk/handle/123456789/7924 | - |
| dc.description.abstract | The Internet of Things (IoT) is described as an object or device, both physical and virtual, that is linked to and communicates with one another and is incorporated into a network for a particular purpose. Actuators, Sensors, and Radio-frequency identification (RFID) are some of the technologies and equipment that the IoT uses to gather data. In the IoT, data produced by sensors are not only collected but also analyzed. Keeping out all attackers and intruders is a need for IoT applications to prevent attacks. There must be a safe environment for information sharing, with strong privacy protections in place. IoT must encourage an environment in which people and things interact to improve the overall quality of life. Anyone may build, install, and utilize IoT infrastructure since it is open source and free of copyright restrictions. We will be discussing the Internet of Things Architecture, Applications, Security Issues and Requirements, and Security Mechanisms in this paper | en_US |
| dc.language.iso | en_US | en_US |
| dc.publisher | Faculty of Management and Commerce, South Eastern University of Sri Lanka | en_US |
| dc.subject | IoT | en_US |
| dc.subject | IoT application | en_US |
| dc.subject | IoT architecture | en_US |
| dc.subject | protocols | en_US |
| dc.subject | security | en_US |
| dc.subject | threat | en_US |
| dc.title | A review of IOT architecture, applications, security requirements and mechanisms | en_US |
| dc.type | Article | en_US |
| Appears in Collections: | Research Articles | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| JISIT 2021 Volume 6 No 2 Paper 2 Page 10 27.pdf | 569.76 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.