Author : Mr. Vikram Neerugatti 1
Date of Publication :7th March 2017
Abstract: Internet of things involves network of Nodes (sensors, Actuators, fog, cloud etc). Sensor node is a small in size, computing power and storage capacity is less. Due to this nature of Sensor the security module is not incorporated in it. So IoT Nodes has more scope for the Intruders, to attack the systems by using this weak connection of Nodes. Lot of research work has to do in this area, to establish a secure connectivity among various IoT nodes. While accomplishing the secure connectivity of things in IoT, need to consider all the security parameters like (confidentiality, authentication, integrity, etc.). The existing techniques/ Algorithms for secure connectivity of devices are not developed for nodes that which used in an IoT technology and not deal with all security parameters. This paper addressed the various existing secure connectivity techniques with advantages and disadvantages, that which is used to direct Research towards development of secure connectivity Techniques for IoT nodes.
Reference :
-
- Jason Barbour, Mohamed Younis, “Sensor Network Connectivity and Security Analysis Using a Single Per-node Random Key” in IEEE 2007.
- Henning Sanneck, ChristophSchmelz,“Auto – Connectivity and security setup for access network elements” in IEEE 2009.
- PekkaNikander, Andrei Gurtov, and Thomas R. Henderson, “Host Identity Protocol (HIP): Connectivity, Mobility, Multi – Homing, Security, and Privacy over IPv4 and IPv6 Networks” in IEEE 2010.
- JiaJie, Zhang Zhaoyang, Chen Jian, Zhao Linliang, Wang Xingwei.”Integrated Coverage Control and Security Connectivity in Mobile Sensor Networks” in IEEE 2010.
- Daniel Corujo, Marcelo Lebre, Diogo Gomes, Rui L. Aguiar. “A Framework for the Connectivity of an Internet of Things “ in IEEE 2011
- Pablo Pu˜nal Pereira, Jens Eliasson, Rumen Kyusakov,“Enabling Cloud-connectivity for Mobile Internet of Things Applications” in IEEE 2012.
- Leonardo Goratti, â™Gary Steri, †Karina M. Gomez and â™GianmarcoBaldini, “Connectivity and Security in a D2D CommunicationProtocals for public safety application” in IEEE 2014.
- Jorge Granjal, EdmundoMonteiro, and Jorge Sá Silva, “Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues” in IEEE 2015.
- Shaoquan Jiang, “Group Key Agreement with Local Connectivity” in IEEE 2015.
- Samar RazaTalpur, SamehAbdalla, TaharKechadi, “Towards Middleware Security Framework for Next Generation Data Centers Connectivity” in 2015.
- Joseph Decuir, “ The story of the internet of things “ in IEEE 2015.
- Yi Han,Yan Chen,Beibei Wang, K. J. Ray Liu,” Enabling Heterogeneous Connectivity in Internet of Things: A Time –Reversal approach” in IEEE2016.
- Jiu-huZheng, Huan-yanQian, Lie Wang, “Defense Technology of Wormhole Attacks Based on Node Connectivity” in IEEE 2015.
- YonalKirsal∗, YoneyKirsal Ever †, “Analytical Modelling and Performability Evaluation OF LTE as dominant connectivity technology for internet of things “ in 2016.
- Prachi Raut1, Nisha Sarwade2,” Study of Environmental Effects on the Connectivity of Molecular Communication Based Internet of Nano things” in IEEE 2016.
- Philip N. Ji and Ting Wang, “Internet of Things with Optical Connectivity, Networking, and Beyond” in IEEE 2015
- Ejaz Ahmed, IbrarYaqoob, Abdullah Gani, Muhammad Imran, and Mohsen Guizani, “Internet-ofThings-Based Smart Environments: State of the Art,Taxonomy, and Open challenges” in IEEE2015.
- Noomene Ben Henda, Karl Norrman and Katharina Pfeffer∗, “Formal Verification of the Security for Dual Connectivity in LTE” in IEEE 2015.