Open Access   Article Go Back

A Security Survey on Internet of Things

A.A. Kulkarni1 , P.K. Mishra2 , B.K. Tripathy3 , Manoranjan Panda4

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-6 , Page no. 1227-1233, Jun-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i6.12271233

Online published on Jun 30, 2018

Copyright © A.A. Kulkarni, P.K. Mishra, B.K. Tripathy, Manoranjan Panda . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: A.A. Kulkarni, P.K. Mishra, B.K. Tripathy, Manoranjan Panda, “A Security Survey on Internet of Things,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1227-1233, 2018.

MLA Style Citation: A.A. Kulkarni, P.K. Mishra, B.K. Tripathy, Manoranjan Panda "A Security Survey on Internet of Things." International Journal of Computer Sciences and Engineering 6.6 (2018): 1227-1233.

APA Style Citation: A.A. Kulkarni, P.K. Mishra, B.K. Tripathy, Manoranjan Panda, (2018). A Security Survey on Internet of Things. International Journal of Computer Sciences and Engineering, 6(6), 1227-1233.

BibTex Style Citation:
@article{Kulkarni_2018,
author = {A.A. Kulkarni, P.K. Mishra, B.K. Tripathy, Manoranjan Panda},
title = {A Security Survey on Internet of Things},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2018},
volume = {6},
Issue = {6},
month = {6},
year = {2018},
issn = {2347-2693},
pages = {1227-1233},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2332},
doi = {https://doi.org/10.26438/ijcse/v6i6.12271233}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i6.12271233}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2332
TI - A Security Survey on Internet of Things
T2 - International Journal of Computer Sciences and Engineering
AU - A.A. Kulkarni, P.K. Mishra, B.K. Tripathy, Manoranjan Panda
PY - 2018
DA - 2018/06/30
PB - IJCSE, Indore, INDIA
SP - 1227-1233
IS - 6
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
577 396 downloads 241 downloads
  
  
           

Abstract

The Internet of Things (IoT) brings together a multitude of technologies, with a vision of creating an interconnected world. This will benefit both corporations as well as the end users. However, a plethora of security and privacy challenges need to be addressed for the IoT to be fully realized. In this paper, we identify and discuss the properties that constitute the uniqueness of the IoT in terms of the upcoming security and privacy challenges. Furthermore, we construct requirements induced by the aforementioned properties. We survey the four most dominant IoT architectures and analyse their security and privacy components with respect to the requirements. Our analysis shows a mediocre coverage of security and privacy requirements. Finally, through our survey, we identify a number of research gaps that constitute the steps ahead for future research.

Key-Words / Index Term

Internet of Things, IoT Architecture, IoT Applications, Security, Privacy, Future Trends

References

[1] William M.S Stout, Vincent E “Challenges to securing the IOT” , 2016, Sandia National Laboratories Albuquerque, New Mexico, IEEE.
[2] Mangal Sain, Young J K, Hoon J Lee “Survey on Security in IoT of things: State of the art and Challenges”, 2017, ICACT.
[3] Surapon K, Panwit T, Kind Monngkut’s,“A survey on IOT Architecture, Protocol, Applications, Security, Privacy, Real world implementation and future trends”,Institute of Technology Ladkrabang, Bankok, Thailand.
[4] Imen B I, Abderrazak Jemai, Adlen Loukil,“A survey on security of IoT in the context ode Health and clouds”, 2016, 11’th International Design and Test Symposium.
[5] Ivor D Addo, Sheikh I Ahamed, Stephen S Y, Arun Buduru “A reference Architecture for Improving Security and Privacy in Internet of Things Applications”, 2014, IEEE International Conference on Mobile Services.
[6] Krishna Kanth Gupta, Sapna Shukla “Internet of Things: Security Challenges for Next Generation Networks”, 2016, 1’st International Conference on Innovation and challenges in Cyber security.
[7] Jie Lin, Wei Yu, Nan Zhang, Xinyu Yang, Hanlin Zhang and Wei Zho “A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications”, 2017, IEEE Internet of Things Journal.
[8] Minela G, Drazen P, Srdan P, Vladimir K,“Provided security measures of enabling technologies in Internet of Things (IoT): A survey”, 2016, IEEE.
[9] Shain Armstrong RFID Basics: How RFID Tags Work last accessed from http://blog.atlasrfidstore.com/rfid-tag-basics on November 24, 2011.
[10] “A survey on Internet of things architectures”, Journal of King Saud University – Computer and Information Sciences, 8 October 2016.
[11] ZigBee: Brief Introduction. Noor Ul Mushtaq. Retrieved 2016.
[12] Wireless Devices in Process Manufacturing last accessed from http://www.arcweb.com/market-studies/pages/wireless-devices-for-process-industries.aspx
[13] Prak,S.; Kim, K:, Haddad, W.; Chalrabarti, S; Laganier, . IPv6 over Low Power WPAN Security Analysis. IETF. I-D deaft-daniel-6lowpan-security-analysis-05. Retrieved 10 May 2016.
[14] Atzori L., Iera A. and Morabito G. “The Internet of Things: A Survey”. Computer Networks Journal, June 2010, 2787-2805. (1999). Rule learning by seven-month-old infants. Science, 283(5398), 77-80.
[15] R. V. Dharmadhikari 1,S. S. Turambekar,S. C. Dolli,P K Akulwar "Cloud Computing: Data Storage Protocols and Security Techniques", International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.2, pp.113-118, April (2018).
[16] Oluigbo Ikenna V, Nwokonkwo Obi C., Ezeh Gloria N., Ndukwe Ngoziobasi G. "Revolutionizing the Healthcare Industry in Nigeria: The Role of Internet of Things and Big Data Analytics", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.6, pp.1-12, December (2017)