A survey on secured internet of things architecture

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    The Internet of Things (IoT) introduces an inventive and perceptive of a future Internet where users, computing systems, and everyday items owning sensing and actuating abilities cooperate with unique comfort and financial advantages. Many heterogeneous devices get connected and contribute to the IoT and are known as things.Internet of Things (IoT) enables these things to correspond, compute and make decisions on the network. In such a heterogeneous environment, every user of IoT will have a unique purpose to be served in the form of communication and computation. There is a threat that a malicious user can demolish the security and privacy of the network. Hence any application in the environment of IoT is prone to various attacks and threats. At this point, security becomes a high priority in IoT. To ensure security, care must be taken to guarantee confidentiality, authenticity, data integrity and non-repudiation. In this paperaddress various conventional techniques for providing security of IoT devices and present analysis of existing solutions for IoT. Firstly, as security will be a fundamental allowing thing of most IoT applications, mechanisms must also be designed to defend communications enabled by such technologies. Later, we identify some suitable security algorithms.

  • Keywords

    Internet of Things (IoT); Lightweight Algorithms; RFID; Data Encryption; Privacy.

  • References

      [1] Santhosh Krishna B V, Gnanasekaran T,ASystematic Study of Security Issues inInternet-of-Things (IoT), International conference on I-SMAC (I-SMAC 2017).

      [2] Matharu, Gurpreet Singh, Priyanka Upadhyay, & Lalita Chaudhary. "The Internet of Things: Challenges & security issues", 2014 International Conference on EmergingTechnologies (ICET), 2014.

      [3] Isha and Ashish Kr. Luhach, “Analysis of Lightweight Cryptographic Solutions for the Internet of Things”, July 2016, Indian Journal of Science and Technology, Vol 9(28).

      [4] Saurabh Singh, Pradip Kumar Sharma, Seo Yeon Moon, Jong Hyuk Park. "Advanced lightweight encryption algorithms for IoT devices: survey, challenges, and solutions", Journal of Ambient Intelligence and Humanized Computing, 2017.

      [5] Qi Jing, Athanasios V. Vasilakos, Jiafu Wan, Jingwei Lu, DechaoQiu. "Security of the Internet of Things: perspectives and challenges", Wireless Networks, 2014.

      [6] Christos Karamanolis. "Hybrid Cloud Storage", ACM SIGOPS Operating Systems Review, 2017.




Article ID: 10596
DOI: 10.14419/ijet.v7i2.7.10596

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.