TR
EN
An in-depth exam of IoT, IoT Core Components, IoT Layers, and Attack Types
Öz
The Internet of Things (IoT) is a global network of devices that can communicate with each other through different communication protocols and have the ability to detect and process data. Since the Internet of Things connects electronic devices to the Internet for efficient examination and execution of daily activities, it has a seriously positive effect on human life. These devices use some communication protocols to communicate with each other. The selection of these communication protocols is of great importance. The data obtained from these smart devices are stored with the help of cloud technology. These stored data reveal the concept of big data. The processing and analysis of these data are of great importance. Machine learning methods are of great importance in processing this large amount of data. In this study, IoT, the basic components of the IoT, layer structure, security attacks are examined.
Anahtar Kelimeler
Kaynakça
- Abdel‐Basset, M., Manogaran, G., Mohamed, M., & Rushdy, E. (2019). Internet of things in smart education environment: Supportive framework in the decision‐making process. Concurrency and Computation: Practice and Experience, 31(10), e4515.
- Ahmad, A., Hababeh, M., Abu-Hantash, A., AbuHour, Y., & Musleh, H. (2020). Reduce Effect of Dependent Malicious Sensor Nodes in WSNs using Pairs Counting and Fake Packets. International Journal of Computers, Communications and Control, 15(5).
- Andreica, G. R., Bozga, L., Zinca, D., & Dobrota, V. (2020). Denial of service and man-in-the-middle attacks against IoT devices in a GPS-based monitoring software for intelligent transportation systems. Paper presented at the 2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet).
- Andy, S., Rahardjo, B., & Hanindhito, B. (2017). Attack scenarios and security analysis of MQTT communication protocol in IoT system. Paper presented at the 2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI).
- Ashouri, M., Davidsson, P., & Spalazzese, R. (2018). Cloud, edge, or both? Towards decision support for designing IoT applications. Paper presented at the 2018 Fifth International Conference on Internet of Things: Systems, Management and Security.
- Borycki, D. (2017). Programming for the Internet of Things: Using Windows 10 IoT Core and Azure IoT Suite: Microsoft Press.
- Ceron, J. M., Steding-Jessen, K., Hoepers, C., Granville, L. Z., & Margi, C. B. (2019). Improving iot botnet investigation using an adaptive network layer. Sensors, 19(3), 727.
- Citoni, B., Fioranelli, F., Imran, M. A., & Abbasi, Q. H. (2019). Internet of Things and LoRaWAN-enabled future smart farming. IEEE Internet of Things Magazine, 2(4), 14-19.
Ayrıntılar
Birincil Dil
İngilizce
Konular
Mühendislik
Bölüm
Araştırma Makalesi
Yayımlanma Tarihi
30 Kasım 2021
Gönderilme Tarihi
15 Ekim 2021
Kabul Tarihi
16 Ekim 2021
Yayımlandığı Sayı
Yıl 2021 Sayı: 28
APA
Yıldırım, M., Demiroğlu, U., & Şenol, B. (2021). An in-depth exam of IoT, IoT Core Components, IoT Layers, and Attack Types. Avrupa Bilim ve Teknoloji Dergisi, 28, 665-669. https://doi.org/10.31590/ejosat.1010023
AMA
1.Yıldırım M, Demiroğlu U, Şenol B. An in-depth exam of IoT, IoT Core Components, IoT Layers, and Attack Types. EJOSAT. 2021;(28):665-669. doi:10.31590/ejosat.1010023
Chicago
Yıldırım, Muhammed, Uğur Demiroğlu, ve Bilal Şenol. 2021. “An in-depth exam of IoT, IoT Core Components, IoT Layers, and Attack Types”. Avrupa Bilim ve Teknoloji Dergisi, sy 28: 665-69. https://doi.org/10.31590/ejosat.1010023.
EndNote
Yıldırım M, Demiroğlu U, Şenol B (01 Kasım 2021) An in-depth exam of IoT, IoT Core Components, IoT Layers, and Attack Types. Avrupa Bilim ve Teknoloji Dergisi 28 665–669.
IEEE
[1]M. Yıldırım, U. Demiroğlu, ve B. Şenol, “An in-depth exam of IoT, IoT Core Components, IoT Layers, and Attack Types”, EJOSAT, sy 28, ss. 665–669, Kas. 2021, doi: 10.31590/ejosat.1010023.
ISNAD
Yıldırım, Muhammed - Demiroğlu, Uğur - Şenol, Bilal. “An in-depth exam of IoT, IoT Core Components, IoT Layers, and Attack Types”. Avrupa Bilim ve Teknoloji Dergisi. 28 (01 Kasım 2021): 665-669. https://doi.org/10.31590/ejosat.1010023.
JAMA
1.Yıldırım M, Demiroğlu U, Şenol B. An in-depth exam of IoT, IoT Core Components, IoT Layers, and Attack Types. EJOSAT. 2021;:665–669.
MLA
Yıldırım, Muhammed, vd. “An in-depth exam of IoT, IoT Core Components, IoT Layers, and Attack Types”. Avrupa Bilim ve Teknoloji Dergisi, sy 28, Kasım 2021, ss. 665-9, doi:10.31590/ejosat.1010023.
Vancouver
1.Muhammed Yıldırım, Uğur Demiroğlu, Bilal Şenol. An in-depth exam of IoT, IoT Core Components, IoT Layers, and Attack Types. EJOSAT. 01 Kasım 2021;(28):665-9. doi:10.31590/ejosat.1010023
Cited By
Device Access Control and Key Exchange (DACK) Protocol for Internet of Things
International Journal of Cloud Applications and Computing
https://doi.org/10.4018/IJCAC.297103IoT-Enabled healthcare ecosystems: innovations in remote monitoring, patient outcomes, and digital transformation
Informatics for Health and Social Care
https://doi.org/10.1080/17538157.2025.2605557