Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Security in Internet of Things (IOT): Review

Author : Deepika Sherawat 1

Date of Publication :20th November 2017

Abstract: The internet of things (IOT) has been a research subject for the last decade. Security and privacy are the key issues facing IOT applications, and are still facing some huge challenges. To promote this emerging area, authors briefly review the progress of IOT research, and pay attention to security. Nevertheless, from a security and privacy viewpoint, this new reality (IOT) built on the Internet contains new kinds of challenges. Because of the various standards and communication stacks involved, conventional security primitives cannot be used directly on IOT technologies. In addition to issues of scalability and heterogeneity, the major part of the IOT infrastructure consists of resource-constrained devices such as RFIDs and wireless nodes. Hence, in such a dynamic environment, a versatile architecture is required capable of addressing security and privacy issues. The security requirements are given by means of a thorough analysis of the safety architecture and features. Based on these, authors address the research status of key technologies, including encryption mechanisms, communication security, sensor data protection and cryptographic algorithms, and outline the challenges concisely

Reference :

    1. A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, “Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications,” IEEE Commun. Surv. Tutorials, 2015, doi: 10.1109/COMST.2015.2444095.
    2. P. Rawat, K. D. Singh, and J. M. Bonnin, “Cognitive radio for M2M and Internet of Things: A survey,” Comput. Commun., 2016, doi: 10.1016/j.comcom.2016.07.012.
    3. A. Lele, “Internet of things (IoT),” in Smart Innovation, Systems and Technologies, 2019
    4. H. Suo, J. Wan, C. Zou, and J. Liu, “Security in the internet of things: A review,” 2012, doi: 10.1109/ICCSEE.2012.373.
    5. S. M. R. Islam, D. Kwak, M. H. Kabir, M. Hossain, and K. S. Kwak, “The internet of things for health care: A comprehensive survey,” IEEE Access, 2015, doi: 10.1109/ACCESS.2015.2437951.
    6. S. M. R. Islam, D. Kwak, M. H. Kabir, M. Hossain, and K. S. Kwak, “The internet of things for health care: A comprehensive survey,” IEEE Access, 2015, doi: 10.1109/ACCESS.2015.2437951.
    7. O. G. O. & M. A. B. Muhammad A. Iqbal, “A Review on Internet of Things (Iot): Security and Privacy Requirements and the Solution Approaches,” Glob. J. Comput. Sci. Technol. E Network, Web Secur., 2016, doi: 10.1111/j.1399-6576.1984.tb02071.x
    8. A. R. Sadeghi, C. Wachsmann, and M. Waidner, “Security and privacy challenges in industrial Internet of Things,” 2015, doi: 10.1145/2744769.2747942.

Recent Article