Acta Scientific Computer Sciences (ASCS)

Research Article Volume 2 Issue 3

The Internet of Things and Cybersecurity

Cheryl Ann Alexander1* and Lidong Wang2

1Institute for IT innovation and Smart Health, Mississippi, USA
2Institute for Systems Engineering Research, Mississippi state university, Vicksburg, USA

*Corresponding Author: Cheryl Ann Alexander, Institute for IT Innovation and Smart Health, Mississippi, USA.

Received: February 18, 2020; Published: February 26, 2020



  The Internet of Things (IoT) is a various collection of interconnected Internet devices such as sensors, smartphones, PCs, wristwatches, etc. These interconnected devices can play an important role in the care of elderly adults with chronic illness, children, communication, and more. However, cybersecurity is critical in the IoT arena because not all are completely secure from hackers and Ransomware, viruses, malware, and other software to steal data and money can compromise sensors, smartphones, PCs, tablets, etc. In this study, we will look at an overview of cybersecurity in IoT and take a special look at how IoT is used in the care of elderly adults and those with special needs and how engineering solutions in IoT can help.

Keywords: Internet of Things; Cybersecurity; Special Needs; Interconnected devices; Sensors



  1. Kanuparthi A., et al. “Hardware and embedded security in the context of internet of things”. In Proceedings of the 2013 ACM workshop on Security, privacy and dependability for cyber vehicles (2013): 61-64.
  2. Prokofiev AO., et al. “The Internet of Things cybersecurity examination”. 2017 Siberian Symposium on Data Science and Engineering (SSDSE), Data Science and Engineering (SSDSE), 2017 Siberian Symposium On (2017): 44. 
  3. Đekić MD. “The Internet of Things Security”. Tehnika (2017): 309.
  4. Chong I., et al. “Human Factors in the Privacy and Security of the Internet of Things”. Ergonomics in Design 27 (2019): 5-10.
  5. Tschider CA. “Regulating the Internet of Things: Discrimination, Privacy, and Cybersecurity in the Artificial Intelligence Age”. Denver Law Review 1 (2018): 87.
  6. Abo-Seada AA. “The Impact of the Internet of Things on Libraries and Users”. Computers in Libraries 39.1 (2019): 18-21.
  7. Swire P and Woo J. “Privacy and Cybersecurity Lessons at the Intersection of the Internet of Things and Police Body-Worn Cameras”. North Carolina Law Review 5 (2017): 1475. 
  8. Ferati M., et al. “Augmenting Requirements Gathering for People with Special Needs Using IoT: A Position Paper”. 2016 IEEE/ACM Cooperative and Human Aspects of Software Engineering (CHASE), Cooperative and Human Aspects of Software Engineering (CHASE), 2016 IEEE/ACM, CHASE (2016): 48.
  9. Ludi S., et al. “Requirements gathering for assistive technology that includes low vision and sighted users”. 2012 First International Workshop on Usability and Accessibility Focused Requirements Engineering (UsARE), Usability and Accessibility Focused Requirements Engineering (UsARE) (2012).
  10. Ferati M., et al. “Accessibility requirements for blind and visually impaired in a regional context: An exploratory study”. 2014 IEEE 2nd International Workshop on Usability and Accessibility Focused Requirements Engineering (UsARE), Usability and Accessibility Focused Requirements Engineering (UsARE) (2014).
  11. Baule SM. “Evaluating the Accessibility of Special Education Cooperative Websites for Individuals with Disabilities”. TechTrends: Linking Research and Practice to Improve Learning A Publication of the Association for Educational Communications and Technology 1 (2019).
  12. Baig MM., et al. “A Systematic Review of Wearable Sensors and IoT-Based Monitoring Applications for Older Adults – a Focus on Ageing Population and Independent Living”. Journal of Medical Systems 43(2019).
  13. Saadeh W., et al. “A Patient-Specific Single Sensor IoT-Based Wearable Fall Prediction and Detection System”. IEEE Transactions on Neural Systems and Rehabilitation Engineering, Neural Systems and Rehabilitation Engineering, IEEE Transactions on, IEEE Transactions on Neural Systems and Rehabilitation Engineering (2019): 995.
  14. Alkhatib S., et al. “Privacy and the Internet of Things (IoT) Monitoring Solutions for Older Adults: A Review”. Health Informatics Conference, Sydney Australia, 2018. Studies in Health Technology and Informatics 252 (2018): 8-14.


Citation: Cheryl Ann Alexander and Lidong Wang. “The Internet of Things and Cybersecurity”. Acta Scientific Computer Sciences 2.3 (2020): 14-18.


Acceptance rate35%
Acceptance to publication20-30 days

Indexed In

News and Events

  • Certification for Review
    Acta Scientific certifies the Editors/reviewers for their review done towards the assigned articles of the respective journals.
  • Submission Timeline for Upcoming Issue
    The last date for submission of articles for regular Issues is May 30, 2024.
  • Publication Certificate
    Authors will be issued a "Publication Certificate" as a mark of appreciation for publishing their work.
  • Best Article of the Issue
    The Editors will elect one Best Article after each issue release. The authors of this article will be provided with a certificate of "Best Article of the Issue"
  • Welcoming Article Submission
    Acta Scientific delightfully welcomes active researchers for submission of articles towards the upcoming issue of respective journals.

Contact US