Date of Publication :20th November 2017
Abstract: The internet of things (IOT) has been a research subject for the last decade. Security and privacy are the key issues facing IOT applications, and are still facing some huge challenges. To promote this emerging area, authors briefly review the progress of IOT research, and pay attention to security. Nevertheless, from a security and privacy viewpoint, this new reality (IOT) built on the Internet contains new kinds of challenges. Because of the various standards and communication stacks involved, conventional security primitives cannot be used directly on IOT technologies. In addition to issues of scalability and heterogeneity, the major part of the IOT infrastructure consists of resource-constrained devices such as RFIDs and wireless nodes. Hence, in such a dynamic environment, a versatile architecture is required capable of addressing security and privacy issues. The security requirements are given by means of a thorough analysis of the safety architecture and features. Based on these, authors address the research status of key technologies, including encryption mechanisms, communication security, sensor data protection and cryptographic algorithms, and outline the challenges concisely.
Reference :
-
- A. Soia, O. Konnikova, and E. Konnikov, “The internet of things,” in Proceedings of the 33rd International Business Information Management Association Conference, IBIMA 2019: Education Excellence and Innovation Management through Vision 2020, 2019, doi: 10.4018/ijhiot.2018010101.
- A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, “Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications,” IEEE Commun. Surv. Tutorials, 2015, doi: 10.1109/COMST.2015.2444095.
- P. Rawat, K. D. Singh, and J. M. Bonnin, “Cognitive radio for M2M and Internet of Things: A survey,” Comput. Commun., 2016, doi: 10.1016/j.comcom.2016.07.012.
- A. Lele, “Internet of things (IoT),” in Smart Innovation, Systems and Technologies, 2019.
- H. Suo, J. Wan, C. Zou, and J. Liu, “Security in the internet of things: A review,” in Proceedings - 2012 International Conference on Computer Science and Electronics Engineering, ICCSEE 2012, 2012, doi: 10.1109/ICCSEE.2012.373
- A. Maarof, M. Senhadji, Z. Labbi, and M. Belkasmi, “Security in the internet of things,” in Security and Privacy in Smart Sensor Networks, 2018.
- S. M. R. Islam, D. Kwak, M. H. Kabir, M. Hossain, and K. S. Kwak, “The internet of things for health care: A comprehensive survey,” IEEE Access, 2015, doi: 10.1109/ACCESS.2015.2437951.
- S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, “Security, privacy and trust in Internet of things: The road ahead,” Computer Networks. 2015, doi: 10.1016/j.comnet.2014.11.008.
- O. G. O. & M. A. B. Muhammad A. Iqbal, “A Review on Internet of Things (Iot): Security and Privacy Requirements and the Solution Approaches,” Glob. J. Comput. Sci. Technol. E Network, Web Secur., 2016, doi: 10.1111/j.1399-6576.1984.tb02071.x.
- A. R. Sadeghi, C. Wachsmann, and M. Waidner, “Security and privacy challenges in industrial Internet of Things,” in Proceedings - Design Automation Conference, 2015, doi: 10.1145/2744769.2747942. Ritika Wason, Mandeep Kaur and Vishal Jain, “Content Delivery Networks” Book Title “E-commerce Data Security with Cloud Computing”, Cambridge Scholars Publishing, U. K. page no. 84 to 107, June, 2019.
- Ritika Wason, Vishal Jain, Gagandeep Singh Narula, Anupam Balyan and Mandeep Kaur, “Smart Robotics for Smart Healthcare”, Advances in Robotics & Mechanical Engineering (ARME), Volume 1, Issue 5, January, 2019, DOI: ARME.MS.ID.000121.
- Ritika Wason, Vishal Jain, Gagandeep Singh Narula, Anupam Balyan, “Deep Understanding of 3-D Multimedia Information Retrieval on Social Media: Implications and Challenges”, Iran Journal of Computer Science, ISSN: 2520-8438 (Print) 2520-8446 (Online).
- RS Venkatesh, PK Reejeesh, S Balamurugan, S Charanyaa, “Further More Investigations on Evolution of Approaches for Cloud Security”, International Journal of Innovative Research in Computer and Communication Engineering , Vol. 3, Issue 1, January 2015
- K Deepika, N Naveen Prasad, S Balamurugan, S Charanyaa, “Survey on Security on Cloud Computing by Trusted Computer Strategy”, International Journal of Innovative Research in Computer and Communication Engineering, 2015
- P Durga, S Jeevitha, A Poomalai, M Sowmiya, S Balamurugan, “Aspect Oriented Strategy to model the Examination Management Systems”, International Journal of Innovative Research in Science, Engineering and Technology , Vol. 4, Issue 2, February 2015
- RS Venkatesh, PK Reejeesh, S Balamurugan, S Charanyaa, “Further More Investigations on Evolution of Approaches and Methodologies for Securing Computational Grids”, International Journal of Innovative Research in Science, Engineering and Technology , Vol. 4, Issue 1, January 2015
- V M Prabhakaran, S Balamurugan, S Charanyaa, “Developing Use Cases and State Transition Models for Effective Protection of Electronic Health Records (EHRs) in Cloud”, International Journal of Innovative Research in Computer and Communication Engineering, 2015
- VM Prabhakaran, S Balamurugan, S Charanyaa, “ Entity Relationship Looming of Efficient Protection Strategies to Preserve Privacy of Personal Health Records (PHRs) in Cloud”, International Journal of Innovative Research in Computer and Communication Engineering, 2015