Home » Durable Assurance for Securing IoT Systems

Durable Assurance for Securing IoT Systems

Manjima De Sarkar

Dept. of ECE,
NIT Arunachal Pradesh, India


The durable assurance of popularity of an internet of things, that is most recently that true authentic numbers of connecting things that have been arranged in everywhere. Now a  day’s  trends build on the things in the complex and interconnected system is in the hands of their manufacturer and of cloud providers auxiliary IoT synthesis platforms. Different matters of contention points correlate with data privacy appear from this situation.  Users have to trust manufacturers and IoT platforms for handling their data, but the combination of heterogeneous platforms is still only elementary. In this condition paper, we blueprint a new IOT planning, that intent at setup data privacy by design and that we accredit as the foundation for a more encyclopedic IoT integration. The proposed architecture is established on two simple but powerful visionary component families, the cleansers, and blenders, those permit data owners to get back the control of IoT data and its processing. The aim of this paper is to blueprint the groundwork for an architectural style able to supper the recent generation of IoT functions.  


Data exchanges;
Embedded Security;
Embedded System;
Securing IoT Systems.

download pdf

Cited as

Manjima De Sarkar, “Durable Assurance for Securing IOT Systems,” International Journal of Advanced Engineering and Management, vol. 2, no. 10, pp. 248-251,  2017.

DOI: https://doi.org/10.24999/IJOAEM/02100054


  1. Inamdar, S. and Roy, S. (2017). Internet of Things: Architecture, Security and Applications. International Journal of Advanced Engineering and Management, 2(7),157-167.
  2. Anderson, T., Peterson, L., Shenker, S., & Turner, J. (2005). Overcoming the Internet impasse through virtualization. Computer, 38(4), 34-41.
  3. Perera, C., Zaslavsky, A., Christen, P., & Georgakopoulos, D. (2014). Context aware computing for the internet of things: A survey. IEEE Communications Surveys & Tutorials, 16(1), 414-454.
  4. Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for Internet of Things. Journal of network and computer applications, 42, 120-134.
  5. Chen, S., Xu, H., Liu, D., Hu, B., & Wang, H. (2014). A vision of IoT: Applications, challenges, and opportunities with china perspective. IEEE Internet of Things journal, 1(4), 349-359.
  6. Ripeanu, M. (2001, August). Peer-to-peer architecture case study: Gnutella network. In Peer-to-Peer Computing, 2001. Proceedings. First International Conference on (pp. 99-100). IEEE.
  7. Ratnasamy, S., Karp, B., Yin, L., Yu, F., Estrin, D., Govindan, R., & Shenker, S. (2002, September). GHT: a geographic hash table for data-centric storage. In Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications.
  8. Axinn, W. G., Fricke, T. E., & Thornton, A. (1991). The microdemographic community-study approach: Improving survey data by integrating the ethnographic method. Sociological Methods & Research, 20(2), 187-217.
  9. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: a survey. Computer networks, 38(4), 393-422.
  10. Modi, C., Patel, D., Borisaniya, B., Patel, A., & Rajarajan, M. (2013). A survey on security issues and solutions at different layers of Cloud computing. The Journal of Supercomputing, 63(2), 561-592.
  11. Cardiel, I. A., Gil, R. H., Somolinos, C. C., & Somolinos, J. C. (2012). A SCADA oriented middleware for RFID technology. Expert Systems with Applications, 39(12), 11115-11124.steakhouse-1
%d bloggers like this: