TR
EN
An in-depth exam of IoT, IoT Core Components, IoT Layers, and Attack Types
Abstract
The Internet of Things (IoT) is a global network of devices that can communicate with each other through different communication protocols and have the ability to detect and process data. Since the Internet of Things connects electronic devices to the Internet for efficient examination and execution of daily activities, it has a seriously positive effect on human life. These devices use some communication protocols to communicate with each other. The selection of these communication protocols is of great importance. The data obtained from these smart devices are stored with the help of cloud technology. These stored data reveal the concept of big data. The processing and analysis of these data are of great importance. Machine learning methods are of great importance in processing this large amount of data. In this study, IoT, the basic components of the IoT, layer structure, security attacks are examined.
Keywords
References
- Abdel‐Basset, M., Manogaran, G., Mohamed, M., & Rushdy, E. (2019). Internet of things in smart education environment: Supportive framework in the decision‐making process. Concurrency and Computation: Practice and Experience, 31(10), e4515.
- Ahmad, A., Hababeh, M., Abu-Hantash, A., AbuHour, Y., & Musleh, H. (2020). Reduce Effect of Dependent Malicious Sensor Nodes in WSNs using Pairs Counting and Fake Packets. International Journal of Computers, Communications and Control, 15(5).
- Andreica, G. R., Bozga, L., Zinca, D., & Dobrota, V. (2020). Denial of service and man-in-the-middle attacks against IoT devices in a GPS-based monitoring software for intelligent transportation systems. Paper presented at the 2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet).
- Andy, S., Rahardjo, B., & Hanindhito, B. (2017). Attack scenarios and security analysis of MQTT communication protocol in IoT system. Paper presented at the 2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI).
- Ashouri, M., Davidsson, P., & Spalazzese, R. (2018). Cloud, edge, or both? Towards decision support for designing IoT applications. Paper presented at the 2018 Fifth International Conference on Internet of Things: Systems, Management and Security.
- Borycki, D. (2017). Programming for the Internet of Things: Using Windows 10 IoT Core and Azure IoT Suite: Microsoft Press.
- Ceron, J. M., Steding-Jessen, K., Hoepers, C., Granville, L. Z., & Margi, C. B. (2019). Improving iot botnet investigation using an adaptive network layer. Sensors, 19(3), 727.
- Citoni, B., Fioranelli, F., Imran, M. A., & Abbasi, Q. H. (2019). Internet of Things and LoRaWAN-enabled future smart farming. IEEE Internet of Things Magazine, 2(4), 14-19.
Details
Primary Language
English
Subjects
Engineering
Journal Section
Research Article
Publication Date
November 30, 2021
Submission Date
October 15, 2021
Acceptance Date
October 16, 2021
Published in Issue
Year 2021 Number: 28
APA
Yıldırım, M., Demiroğlu, U., & Şenol, B. (2021). An in-depth exam of IoT, IoT Core Components, IoT Layers, and Attack Types. Avrupa Bilim Ve Teknoloji Dergisi, 28, 665-669. https://doi.org/10.31590/ejosat.1010023
Cited By
Device Access Control and Key Exchange (DACK) Protocol for Internet of Things
International Journal of Cloud Applications and Computing
https://doi.org/10.4018/IJCAC.297103IoT-Enabled healthcare ecosystems: innovations in remote monitoring, patient outcomes, and digital transformation
Informatics for Health and Social Care
https://doi.org/10.1080/17538157.2025.2605557