banner

Security Challenges and Countermeasures for the Heterogeneity of IoT Applications

Deepak Choudhary

Abstract


The Internet of Things (IoT) enables the integration of data from virtual and physical worlds. It involves smart objects that can understand and react to their environment in a variety of industrial, commercial and household settings. As the IoT expands the number of connected devices, there is the potential to allow cyber-attackers into the physical world in which we live, as they seize on security holes in these new systems. New security issues arise through the heterogeneity of IoT applications and devices and their large-scale deployment.


Keywords


IOT, Heterogeneity, Security, Networking, cyber-attacker, deployment, datagram transport layer security, Cryptography

Full Text:

PDF

References


1. Yao, L; Sheng, Q; Dustdar, S. (2015) Web-Based Management of the Internet of Things. IEEE Internet Computing, 19, 4, 66 70.

2. Kortuem, G; Kawsar, F; Fitton, D; Sundramoorthy, V. (2010) Smart Objects as Building Blocks for the Internet

3. of Things. IEEE Internet Computing, 14, 1, 44 51.

4. Shin, D. (2014) A socio-technical framework for Internet-of-Things design: A human-centred design for the Internet of Things. Telematics and Informatics, 31, 519 531.

5. Zhang, Z; Cho, M; Wang, C; Hsu, C; Chen, C; Shieh, S. (2014) IoT security: ongoing challenges and research opportunities. In Proceedings of 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications, 17-19 Nov 2014, Matsue, Japan, pp.230-234.

6. Riahi, A; Challal, Y; Natalizio, E; Chtourou, Z; Bouabdallah, A. (2013) A systemic approach for IoT security. In Proceedings of 2013 IEEE International Conference on Distributed Computing in Sensor Systems,

7. -23 May 2013, Cambridge, MA, US, pp.351-355.

8. Ghani, H; Khelil, A; Suri, N; Csertan, G; Gonczy, L; Urbanics, G; Clarke, J. (2014) Assessing the Security of Internet Connected Critical Infrastructures. Security and Communication Networks, 7, 2713 2725.

9. Hassanzadeh, A; Modi, S; Mulchandani, S. (2015) Towards effective security control assignment in the Industrial Internet of Things. In Proceedings of IEEE 2nd World Forum on Internet of Things, 14-16 Dec 2015, Milan, Italy, pp.795 800.

10. Weber, R. (2010) Internet of Things New security and privacy challenges. Computer Law and Security Review, 26, 23 30.

11. Yang, X; Li, Z; Geng, Z; Zhang, H. (2012) A multi-layer security model for Internet of Things. In Internet of Things (pp.388-393). Springer, Berlin Heidelberg.

12. Roman, R; Zhou, J; Lopez, J. (2013) On the features and challenges of security and privacy in distributed Internet of Things. Computer Networks, 57, 2266 2279.

13. Nolin, J; Olson, N. (2016) The Internet of Things and convenience. Internet Research, 26, 2, 360 376.

14. Petrie, C; Spatscheck, O. (2012) Future Internet Protocols. IEEE Internet Computing, 16, 6, 11 13.

15. Rosado, D; Gutirrez, C; Fernndez-Medina, E; Piattini, M. (2006) Security patterns and requirements for Internet-based applications. Internet Research, 16, 5, 519 536.

16. Almeida, V; Doneda, D; Monteiro, M.(2015)

17. Governance challenges for the Internet of Things. IEEE

18. Internet Computing, 19, 4, 56 59.

19. Atzori, L; Iera, A; G. Morabito, G. (2010) The Internet of Things: A Survey. Computer Networks, 54, 15, 2787 2805.

20. Chen, P; Cheng, S; Chen, K. (2014) Information Fusion to Defend Intentional Attack in Internet of Things. IEEE Internet of Things Journal, 1, 4, 337 348.

21. Granjal, J; Monteiro, E; Silva, J. (2014) Network? layer security for the Internet of Things using TinyOS and BLIP. International Journal of Communication Systems,

22. , 10, 1938-63.

23. Mahalle, PN; Anggorojati, B; Prasad, NR; Rasad, R. (2013). Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things. Journal of Cyber-security and Mobility, 1, 4, 309-348.

24. Raza, S; Shafagh, H; Hewage, K; Hummen, R; Voigt, T. (2013) Lithe: Lightweight secure CoAP for the Internet of Things. IEEE Sensors Journal, 13, 10, 3711-3720.

25. Keoh, S; Kumar, S; Tschofenig, H. (2014) Securing the Internet of Things: A standardization perspective. IEEE Internet of Things Journal, 1, 3, 265-75.

26. Sicari, S; Rizzardi, A; Grieco, L; Coen-Porisiniet, A. (2014) Security, privacy and trust in Internet of Things: The road ahead. Computer Networks, 76, 146 164.

27. Le, A; Loo, J; Lasebae, A; Aiash, M; Luo, Y (2012).

28. 6LoWPAN: a study on QoS security threats and coun- termeasures using intrusion detection system approach. International Journal of Communication Systems, 25, 9,

29. -212.

30. Li, S; Tryfonas, T; Li, H. (2016) The Internet of Things:a security point of view. Internet Research, 26, 2, 337 359.

31. Zhang, K; Liang, X; Lu, R; Shen, X. (2014) Sybil Attacks and Their Defenses in the Internet of Things. IEEE Internet of Things Journal, 1, 5, 372 383.

32. Porambage, P; Braekeny, A; Gurtovz, A; Ylianttila, M; Spinsanteet, S. (2015) Secure End-to-End Communication for Constrained Devices in IoT-enabled Ambient Assisted Living Systems. In Proceedings of IEEE 2nd World Forum on Internet of Things, 14-16 Dec

33. , Milan, Italy, pp.711 714.

34. Nguyen, K; Laurent, M; Nouha Oualhaet, N. (2015)Survey on secure communication protocols for the Internet of Things. Ad Hoc Networks, 32, 17 31.

35. Skarmeta, A; Hernandez-Ramos, J; Moreno, M. (2014) A decentralised approach for Security and Privacy challenges in the Internet of Things. IEEE World Forum on Internet of Things, 6 8 March, 2014, Seoul, Korea, pp.67 72.

36. Oriwoh, E; Sant, P; Epiphaniouet, G. (2013) Guidelines for Internet of Things deployment approaches The Thing Commandments. In Proceedings of the 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks, Oct 21-24, 2013, Niagara Falls, Ontario, Canada pp.122 13.

37. Franssila, H. (2016) Enhancing information interaction as a means for situation awareness maintenance in mobile field work. Cognition, Technology & Work, 18, 3, 567 582.30. Hou, B. and Sheng-Yang, Y. (2012) Design of Distributed Remote Real-Time Monitoring and Control System Based on Internet. Journal of Emerging Trends in Computing and Information Sciences, 3, 7, 1068 1073.

38. Li, F; Xiong, P. (2013) Practical secure communication for integrating wireless sensor networks into the Internet of Things. IEEE Sensors Journal, 13, 10, 3677-84.

39. Gupta, M; Banerjee, S; Agrawal, M; Rao, H. (2008) Security analysis of Internet technology components enabling globally distributed workplaces a framework. ACM Transactions on Internet Technology, 8, 4, 17 55.




DOI: https://doi.org/10.32629/jai.v1i2.25

Refbacks

  • There are currently no refbacks.


Copyright (c) 2019 Deepak Choudhary

License URL: https://creativecommons.org/licenses/by-nc/4.0