A Literature Survey on Internet of Things security issues
Keywords:
Internet of Things, Security, PrivacyAbstract
In day-to-day life, IoT plays a major role . The functionality of IoT is deployed in hospitals, banking sector and also in homes. The work of IoT starts from preventing fires at homes and also supports for the changes in environment. Apart from those benefits, security and privacy is also considering factor. In terms of IoT, the devices connected may not be of the same type which includes type of devices, network used , protocols followed etc. When such variations occur, the security issues cannot be considered in general. Based on the type of device, the security concern has to be independent. An Analysis of various existing protocols and mechanisms are discussed to secure communications in IoT applications. In this paper, Survey of various heterogeneous devices connected to IoT and the security issues related to IoT applications are discussed. Such a survey will be helpful in identification of security issues for different types of IoT applications
References
[1] L. Atzori, A. Iera, and G. Morabito, “The internet of things” A survey, Comput. Netw, 2010 , vol. 54, no. 15, pp. 2787–2805.
[2] Ke Xu, Yi Qu, and Kun Yang. “A Tutorial on the Internet of Things:From a Heterogeneous Network Integration Perspective” IEEE network,March/April 2016.
[3] Yuchen Yang, Longfei Wu, Guisheng Yin, Lijie Li_, and Hongbin Zhao “A Survey on Security and Privacy Issues in Internet-of-Things”
[4] Margaret Rouse, “Iot security (internet of things security),” Internet of-Things-security, 2013.
[5] J. Granjal, E. Monteiro, and J. S. Silva, “A secure interconnection model for ipv6 enabled wireless sensor networks,” in 2010 IFIP Wireless Days, Oct 2010, pp. 1–6
[6] L. Atzori, A. Iera, and G. Morabito, "Understanding the Internet of Things: definition, potentials, and societal role of a fast evolving paradigm," Ad Hoc Networks, vol. 56, pp. 122-140, 2017.
[7] L. Srivastava and T. Kelly, "The internet of things," International Telecommunication Union, Tech. Rep, vol. 7, 2005.
[8] K. Zhao and L. Ge, "A survey on the internet of things security," in Computational Intelligence and Security (CIS), 2013 9th International Conference on, 2013, pp. 663-667.
[9] I. Andrea, C. Chrysostomou, and G. Hadjichristofi, “Internet of things: Security vulnerabilities and challenges,” in 2015 IEEE Symposium on Computers and Communication (ISCC), July 2015, pp. 180–187.
[10] P. Porambage, C. Schmitt, P. Kumar, A. Gurtov, and M. Ylianttila, “Pauthkey: A pervasive authentication protocol and key Establishment scheme for wireless sensor networks in distributed iot applications,” in International Journal of Distributed Sensor Networks, 2014.
[11] C. Zhang and R. Green, “Communication security in internet of thing: Preventive measure and avoid ddos attack over iot network,” in Proceedings of the 18th Symposium on Communications & Networking, ser. CNS ’15. San Diego, CA, USA: Society for Computer Simulation International, 2015, pp. 8–15.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
