Trust Coding for IoT

Alyaa Abdou Hamza Abd El-Rahman;

Abstract


The Internet of Things (IoT) provides the ability for humans and computers to learn and interact from billions of things, including devices, sensors, actuators, services, and other Internet-connected objects. IoT devices enable massive opportunities to automate everyday tasks by increasing machine-to-machine interaction. These smart devices have been used in several domains like healthcare, transportation, smart home, smart city, and more. However, this technology has been exposed to many vulnerabilities, which may lead to cybercrime. Since the number of incidents related to IoT devices is alarming, a new investigation approach is needed to handle the crime associated with IoT devices.
Recently, IoT systems are being rapidly developed with adequate consideration of the increasing need to face security challenges. This could be justified because IoT is an open invitation to hackers to control and attack connected IoT devices. In this context, the programming analysis (static and dynamic) technique is used to achieve a trusted coding for IoT that focuses on defending against attacks on these systems. Also, this technique is responsible for analyzing applications’ behavior accurately to support security & privacy.
Program Analysis (PA) is one of the essential security factors which has more than analysis techniques. These techniques successfully build perfect security analysis system (SAS) that can detect malware. There is a struggle remains between security analysts and malware developers. It is a battle that does not end quickly, because malware is always complex as fast as discovery grows. Analysis techniques examine IoT app source code to recognize applications’ security.


Other data

Title Trust Coding for IoT
Other Titles ترميز موثوق لأنترنت الأشياء
Authors Alyaa Abdou Hamza Abd El-Rahman
Issue Date 2022

Attached Files

File SizeFormat
BB14065.pdf424.96 kBAdobe PDFView/Open
Recommend this item

Similar Items from Core Recommender Database

Google ScholarTM

Check

views 2 in Shams Scholar
downloads 1 in Shams Scholar


Items in Ain Shams Scholar are protected by copyright, with all rights reserved, unless otherwise indicated.