Call For Paper

Volume 10 Issue 4

April 2024

Submit Paper Here
Download Paper Format
Copyright Form
NEWS & UPDATES
News for Authors:

We have started accepting articles by online means directly through website. Its our humble request to all the researchers to go and check the new method of article submission on below link: Submit Manuscript

Follow us on Social Media:

Dear Researchers, to get in touch with the recent developments in the technology and research and to gain free knowledge like , share and follow us on various social media. Facebook

title

Security Framework for SWS Using IoT

Author(s):

Dr. P Bindhu Madhavi

Keywords:

Internet of things, Smart City, Smart Water, Anomaly Behavior Analysis.

Abstract

The Internet of Things (IoT) will associate not just PCs and cell phones, however it will likewise interconnect keen structures, homes, and urban communities. The IoT exploit the most recent correspondence innovations with a specific end goal to give ideal and solid administrations to Smart Cities (SC). The foundation of SC is the Critical Infrastructures, for example, the city's water framework. In SC, the water framework profits by the improvement of mechanization and correspondence advancements to make keen situations which are more proficient in the utilization of the accessible assets; we call it Smart Water System (SWS). In this paper we exhibit a multilayer engineering to coordinate the SWS to the IoT, making it accessible from wherever whenever. Nonetheless, with the presentation of IoT we will encounter stupendous difficulties to secure and ensure its propelled data benefits because of the huge increment of the assault surface, unpredictability, heterogeneity, and number of interconnected assets. We additionally present an IoT Framework for SWSs to construct dependable and secure applications and administrations. The structure empowers designers to consider security issues by any stretch of the imagination IoT layers and coordinate security calculations with the capacities what's more, administrations offered in each layer as opposed to thinking about security in a specially appointed and after idea way. Indicating how this structure can be utilized to grow profoundly secure and dependable SWS administrations and how to apply our Anomaly Behavior Analysis approach to secure and ensure these administrations against any kind of assaults.

Other Details

Paper ID: IJSARTV
Published in: Volume : 4, Issue : 12
Publication Date: 12/18/2018

Article Preview




Download Article