Open Access   Article Go Back

Addressing the Confidentiality and Security of Internet of Things

Shivlal Mewada1

Section:Review Paper, Product Type: Journal Paper
Volume-5 , Issue-4 , Page no. 129-133, Apr-2017

Online published on Apr 30, 2017

Copyright © Shivlal Mewada . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Shivlal Mewada , “Addressing the Confidentiality and Security of Internet of Things,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.4, pp.129-133, 2017.

MLA Style Citation: Shivlal Mewada "Addressing the Confidentiality and Security of Internet of Things." International Journal of Computer Sciences and Engineering 5.4 (2017): 129-133.

APA Style Citation: Shivlal Mewada , (2017). Addressing the Confidentiality and Security of Internet of Things. International Journal of Computer Sciences and Engineering, 5(4), 129-133.

BibTex Style Citation:
@article{Mewada_2017,
author = {Shivlal Mewada },
title = {Addressing the Confidentiality and Security of Internet of Things},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2017},
volume = {5},
Issue = {4},
month = {4},
year = {2017},
issn = {2347-2693},
pages = {129-133},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5399},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5399
TI - Addressing the Confidentiality and Security of Internet of Things
T2 - International Journal of Computer Sciences and Engineering
AU - Shivlal Mewada
PY - 2017
DA - 2017/04/30
PB - IJCSE, Indore, INDIA
SP - 129-133
IS - 4
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
187 223 downloads 164 downloads
  
  
           

Abstract

The IoT is a collection of technologies that work together to create a more connected environment. Both companies and end consumers will gain from this. However, in order for the IoT to be completely realized, a slew of security and privacy issues must be solved. We identify and explore the features that define the IoT`s uniqueness in terms of impending security and privacy issues in this article. We also create criteria that are triggered by the aforementioned attributes. We examine the security and privacy components of the four most popular IoT designs in light of the criteria. According to our findings, security and privacy needs are only sporadically addressed.

Key-Words / Index Term

Security, Privacy, IoT Network, IoT Systems

References

[1]. Andrea Zanella at. al., “Internet of things for smart cities”, IEEE Internet of Things Journal, Vol. 1, No. 1, pp. 22-32, Feb. 2014.
[2]. Rafiullah Khan at. al., “Future internet: The internet of things architecture, possible applications and key challenges,” In 10th International Conference on Frontiers of Information Technology, FIT, pages 257–260. IEEE, 2012.
[3]. Ahmad W Atamli and Andrew Martin., “Threat-Based Security Analysis for the Internet of Things,” In Secure Internet of Things (SIoT), pp. 35–43. IEEE, 2014.
[4]. Sachin Babar at. al., “ Proposed security model and threat taxonomy for the Internet of Things (IoT), “In International Conference on Network Security & Applications (CNSA), pp. 420–429. Springer Berlin Heidelberg, 2010.
[5]. S. Kent and R. Atkinson, “Security Architecture for the Internet Protocol,” RFC 2401 (Proposed Standard), November 1998. Obsoleted by RFC 4301.
[6]. Vangelis Gazis at. al., “Security Perspectives for Collaborative Data Acquisition in the Internet of Things,” In International Conference on Safety and Security in Internet of Things. Springer, 2014.
[7]. Jayavardhana Gubbi at. al., “Internet of Things (IoT, A vision, architectural elements, and future directions,” Future Generation Computer Systems, Vol.29, Issue.7, pp.1645–1660, Sept.2013.
[8]. Anthea Mayzaud at. al., “Monitoring ´ and Security for the Internet of Things”, In International Conference on Autonomous Infrastructure, Management, and Security, pp.37–40. Springer, 2013.
[9]. Daniele Miorandi at. al., “Internet of things: Vision, applications and research challenges,” Ad Hoc Networks, Vol.10, No.7, pp.1497–1516, Sept. 2012.
[10]. Huansheng Ning, Hong Liu, and Laurence T Yang, “Cyberentity Security in the Internet of Things,’ Computer, 46, Issue.4, 46–53, 2013.
[11]. R Roman, P Najera, and J Lopez, “Securing the internet of things,” Computer, Vol.44, Issue.9, 51–58, 2011.
[12]. Rolf H. Weber. Internet of Things – New security and privacy challenges. Computer Law & Security Review, 26, Issue.1, 23–30, January 2010.
[13]. Rodrigo Roman, Jianying Zhou, and Javier Lopez, “On the features and challenges of security and privacy in distributed internet of things,” Computer Networks, Vol.57, Issue.10, 2266–2279, July 2013.
[14]. Sadeghi at. al., “Security and privacy challenges in industrial internet of things,” In Annual Design Automation Conference, pp.54. ACM, 2015.
[15]. Sabrina Sicari at. al., “Security, privacy and trust in internet of things: The road ahead,” Computer Networks, 76, pp.146–164, 2015.
[16]. Zhi-kai Zhang, Michael Cheng, Yi Cho, and Shiuhpyng Shieh, “Emerging Security Threats and Countermeasures in IoT,” In ACM Symposium on Information, Computer and Communications Security, pp.1–6. ACM, 2015.
[17]. Simone Cirani at. al., “Enforcing security mechanisms in the IP-based internet of things: An algorithmic overview,” Algorithms, Vol.6, Issue.2, 197–226, 2013.
[18]. Gunter at. al., “Security in fixed and wireless networks - an introduction to securing data communications,” Wiley, 2003.
[19]. Carlo Maria Medaglia and Alexandru Serbanati. An overview of privacy and security issues in the internet of things. In The Internet of Things, pages 389–395. Springer, 2010.
[20]. Hui Suo, Jiafu Wan, Caifeng Zou, and Jianqi Liu, “Security in the internet of things: a review,” In Computer Science and Electronics Engineering (ICCSEE), 2012.
[21]. Joerg Daubert at. al., “A view on privacy & trust in iot,” In IOT/CPS-Security Workshop, IEEE International Conference on Communications, ICC 2015
[22]. Alexander Iliev and Sean W. Smith., “Protecting client privacy with trusted computing at the server,” IEEE Security & Privacy, 3, Issue.2, 20–28, 2005.
[23]. Audun Jøsang atl. Al., “A survey of trust and reputation systems for online service provision,” Decision Support Systems, 43, Issue.2, pp.618–644, 2007.
[24]. Oleg Logvinov at. al., “Standard for an Architectural Framework for the Internet of Things ( IoT ),” IEEE P2413 Webinar Panelists, pp.1–12, 2014.
[25]. BETaaS Consortium. Building the environment for the things as a service. http://www.betaas.eu/
[26]. IoT-A Consortium. IoT-A – Internet of Things Architecture. http: //www.iot-a.eu/
[27]. Martin Bauer and Sebastian Lange, “Enabling Things to Talk,” Springer Berlin Heidelberg, Berlin, Heidelberg, 2013.
[28]. IoT-A Consortium. Iot-a unified requirements. http://www.iot-a.eu/ public/requirements/. [31 Jan. 2014].
[29]. BETaaS Consortium. D1.4.2 – TaaS Reference Model. http://www.betaas.eu/docs/
[30]. OpenIoT Consortium. OPENIoT D2.3 Detailed Architecture and Proofof-Concept Specifications. http://openiot.eu/?q=node/49, 2013.
[31]. OpenIoT Consortium. OPENIoT project description. http://www.openiot.eu/
[32]. Robert Gwadera. D5.2.1 Privacy and Security Framework. 2013.
[33]. IoT@Work Consortium. D1.2 – Final framework architecture specification. https://www.iot-at-work.eu/
[34]. P. Congdon, B. Aboba, A. Smith, G. Zorn, and J. Roese. IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines. RFC 3580 (Informational), September 2003. Updated by RFC 7268.