Open Access   Article Go Back

A Literature Survey on Internet of Things security issues

V. Suganthi1 , P.K. ManojKumar2

Section:Survey Paper, Product Type: Journal Paper
Volume-07 , Issue-02 , Page no. 139-141, Jan-2019

Online published on Jan 31, 2019

Copyright © V. Suganthi, P.K. ManojKumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: V. Suganthi, P.K. ManojKumar, “A Literature Survey on Internet of Things security issues,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.02, pp.139-141, 2019.

MLA Style Citation: V. Suganthi, P.K. ManojKumar "A Literature Survey on Internet of Things security issues." International Journal of Computer Sciences and Engineering 07.02 (2019): 139-141.

APA Style Citation: V. Suganthi, P.K. ManojKumar, (2019). A Literature Survey on Internet of Things security issues. International Journal of Computer Sciences and Engineering, 07(02), 139-141.

BibTex Style Citation:
@article{Suganthi_2019,
author = {V. Suganthi, P.K. ManojKumar},
title = {A Literature Survey on Internet of Things security issues},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2019},
volume = {07},
Issue = {02},
month = {1},
year = {2019},
issn = {2347-2693},
pages = {139-141},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=663},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=663
TI - A Literature Survey on Internet of Things security issues
T2 - International Journal of Computer Sciences and Engineering
AU - V. Suganthi, P.K. ManojKumar
PY - 2019
DA - 2019/01/31
PB - IJCSE, Indore, INDIA
SP - 139-141
IS - 02
VL - 07
SN - 2347-2693
ER -

           

Abstract

In day-to-day life, IoT plays a major role . The functionality of IoT is deployed in hospitals, banking sector and also in homes. The work of IoT starts from preventing fires at homes and also supports for the changes in environment. Apart from those benefits, security and privacy is also considering factor. In terms of IoT, the devices connected may not be of the same type which includes type of devices, network used , protocols followed etc. When such variations occur, the security issues cannot be considered in general. Based on the type of device, the security concern has to be independent. An Analysis of various existing protocols and mechanisms are discussed to secure communications in IoT applications. In this paper, Survey of various heterogeneous devices connected to IoT and the security issues related to IoT applications are discussed. Such a survey will be helpful in identification of security issues for different types of IoT applications.

Key-Words / Index Term

Internet of Things, Security, Privacy

References

[1] L. Atzori, A. Iera, and G. Morabito, “The internet of things” A survey, Comput. Netw, 2010 , vol. 54, no. 15, pp. 2787–2805.
[2] Ke Xu, Yi Qu, and Kun Yang. “A Tutorial on the Internet of Things:From a Heterogeneous Network Integration Perspective” IEEE network,March/April 2016.
[3] Yuchen Yang, Longfei Wu, Guisheng Yin, Lijie Li_, and Hongbin Zhao “A Survey on Security and Privacy Issues in Internet-of-Things”
[4] Margaret Rouse, “Iot security (internet of things security),” Internet of-Things-security, 2013.
[5] J. Granjal, E. Monteiro, and J. S. Silva, “A secure interconnection model for ipv6 enabled wireless sensor networks,” in 2010 IFIP Wireless Days, Oct 2010, pp. 1–6
[6] L. Atzori, A. Iera, and G. Morabito, "Understanding the Internet of Things: definition, potentials, and societal role of a fast evolving paradigm," Ad Hoc Networks, vol. 56, pp. 122-140, 2017.
[7] L. Srivastava and T. Kelly, "The internet of things," International Telecommunication Union, Tech. Rep, vol. 7, 2005.
[8] K. Zhao and L. Ge, "A survey on the internet of things security," in Computational Intelligence and Security (CIS), 2013 9th International Conference on, 2013, pp. 663-667.
[9] I. Andrea, C. Chrysostomou, and G. Hadjichristofi, “Internet of things: Security vulnerabilities and challenges,” in 2015 IEEE Symposium on Computers and Communication (ISCC), July 2015, pp. 180–187.
[10] P. Porambage, C. Schmitt, P. Kumar, A. Gurtov, and M. Ylianttila, “Pauthkey: A pervasive authentication protocol and key Establishment scheme for wireless sensor networks in distributed iot applications,” in International Journal of Distributed Sensor Networks, 2014.
[11] C. Zhang and R. Green, “Communication security in internet of thing: Preventive measure and avoid ddos attack over iot network,” in Proceedings of the 18th Symposium on Communications & Networking, ser. CNS ’15. San Diego, CA, USA: Society for Computer Simulation International, 2015, pp. 8–15.