Abstract
The Internet of Things (IoT) is changing cities industries and homes. Each of these benefits, however, comes with an enormous risk of security issues and privacy loss. One of the problems is to operate the IoT devices safely and securely, because the complexity increases with the increased number of IoT devices. This expanded complexity makes new security challenges such as safety, privacy, and usability far beyond the difficulties that individual face to provide security to an individual device. This paper highlights security aspects, challenges, importance of security at different layers in IoT, and the existing solutions. Also, different approaches proposed to address security and privacy issues concerning security requirements: authentication, confidentiality, and access control are discussed and analyzed explicitly in the realm of the Internet of Things.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Li S, Tryfonas T, Li H (2016) The internet of things: a security point of view. Internet Res 26(2):337–359
Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Computer networks, vol 76, pp 146–164, ISSN 1389-1286
Balamurugan S, Ayyasamy A, Suresh Joseph K (June 2018) A review on privacy and security challenges in the internet of things (IoT) to protect the device and communication networks. Int J Comput Sci A Inf Sec (IJCSIS) 16(6)
Lin J, Yu W, Zhang N, Yang X, Zhang H, Zhao W (2017) A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J 4(5):1125–1142
Yang Y, Wu L, Yin G, Li L, Zhao H (2017) A survey on security and privacy issues in internet of things. IEEE Internet Things J 4(5):1250–1258
Han Y, Hyun J, Jeong T, YOO J-H, Hong JW-K (2016) A smarthome control system based on context and human speech. 18th international conference on advanced communication technology (ICACT)
Raza S, Duquennoy S, Chung T, Yazar D, Voigt T, Roedig U (2011) Securing communication in 6LowPAN with compressed IPsec. International conference on distributed computing in sensor systems and workshops (DCOSS). Barcelona, pp 1–8
Granjal J, Monteiro E, Sa Silva JS (2010) A secure interconnection model for IPv6 enabled wireless sensor networks. IFIP wireless Dyas. Venice, pp 1–6
Jara AJ, Fernandez D, Lopez P, Zamora-Izquierdo M, Skarmeta A (2014) Lightweight MIPv6 with IPSec support. Mobile Inf Syst 37–77
Kothmavr T, Schmitt C, Hu W, Bruenig M, Carle G (2013) DTLS based security and two-way authentication for the internet of things. Ad Hoc Networks
Raza S, Trabalza D, Voigt T (2012) 6LoWPAN compressed DTLS for CoAP. IEEE 8th international conference on distributed computing in sensor systems. Hangzhou, pp 287–289
Brachmann M, Keoh SL, Morchon O, Kumar S (2012) End-to-end transport security in the IP-based internet of things. pp 1–5
Hummen R, Ziegeldorf J, Shafagh H, Raza S, Wehrle K (2013) Towards viable certificate-based authentication for the internet of things. Proceedings HotWiSec workshop. pp 37–42
Alrawais A, Alhothaily A, Hu C, Cheng X (Mar–Apr 2017) Fog computing for the internet of things: security and privacy issues. IEEE Internet Comput 21(2):34–42
Yi S, Qin Z, Li Q (2015) Security and privacy issues of fog computing: a survey. pp 685–695
Wissam R, Daniele S, Kouichi S (Oct 2017) A new security middle architectture based on fog computing and cloud to support IoT constrained devices. pp 1–8
Fu K, et al. (2016) Safety, security, and privacy threats posed by accelerating trends in the internet of things. Technical report computing community consortium
Sharaf-Dabbagh Y, Saad W (June 2016) On the authentication of devices in the internet of things. IEEE 17th internattional symposium on a world of wireless, mobile and multimedia networks (WoWMoM). pp 1–3
Salman O, Abdullah S, Elhajj IH, Chehab A, Kayssi A (June 2016) Identity-based authentication scheme for the internet of things. In: IEEE symposium on computers and communication (ISCC). pp 1109–1111
Zungeru AM, Gaboitaolelwel J, Diarra B, Chuma JM, Ang L-M, Kolobel L (2019) A secured smart home switching system based on wireless communications and self-energy harvesting
Tewari, Gupta BB (2018) A robust anonymity preserving authentication protocol for IoT devices. IEEE international conference on consumer electronics (ICCE). Las Vegas, NV, pp 1–5
Sfar AR, Natalizio E, Challal Y, Chtourou Z (2017) A roadmap for security challenges in internet of things
Feng H, Fu W (2010) Study of recent development about privacy and security of the internet of things. International conference on web information systems and mining. Sanya, pp 91–95
Zhao YL (Oct 2013) Research on data security technology in internet of things. Applied mechanics and materials, vol 433–435. Trans Tech Publications, Ltd pp 1752–1755
Weis S, Sarma S, Rivest R, Engels D (2004) Security and privacy aspects of low-cost radio frequency identifications systems, vol 2802
Chifor B-C, Bica I, Patriciu V, Pop F (2018) A security authorization scheme for smart home internet of things devices. Future Gener Comput Syst 740–749
Roman R, Zhou J, Lopez J (2013) On the features and challenges of security and privacy in distributed internet of things. Comput Netwroks 57:2266–2279
Balo F (2016) Internet of things: a survey. Int J Appl Math, Electr Comput
Gubbi J, Buyya R, Marusic S, Palaniswami M (2012) Internet of things (IoT): a vision, architectural elements, and future directions
Shahid N, Aneja S (2017) Internet of things: vision, application areas and research challenges. International conference on I-SSMAC (IoT in social, mobile, analytics and cloud) (I-SMAC). Palladam, pp 583–587
Aggarwal C, Ashish N, Sheth A (2013) The internet of things: a survey from the data-centric perspective
Said O, Masud M (2013) Towards internet of things: survey anad future vision. Int J Comput Networks 5:1–17
Perera C, Zaslavsky A, Christen P, Georgakopoulos D (2014) Context aware computing for the internet of things: a survey. IEEE Commun Surv Tutorials 16(1):414–454
Granjal J, Monteiro E, Sa Silva J (2015) Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun Surv Tutorials 17(3):1294–1312
Gil D, Ferrandez A, Mora H, Peeral J (2016) Internet of things: a review of surveys based on context aware intelligent services
Acknowledgement
We would like to thank M.S. Ramaiah Institute of Technology, Computer Science and Engineering, for supporting this research work.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sultana, S.S., Sangeetha, J. (2022). Internet of Things: Security Mechanisms. In: Bindhu, V., Tavares, J.M.R.S., Du, KL. (eds) Proceedings of Third International Conference on Communication, Computing and Electronics Systems . Lecture Notes in Electrical Engineering, vol 844. Springer, Singapore. https://doi.org/10.1007/978-981-16-8862-1_38
Download citation
DOI: https://doi.org/10.1007/978-981-16-8862-1_38
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-8861-4
Online ISBN: 978-981-16-8862-1
eBook Packages: EngineeringEngineering (R0)