The Research on Security Technology for Low-Performance Iot Sensor Node
-
2018-09-01 https://doi.org/10.14419/ijet.v7i3.34.19389 -
Internet of Things, IoT security, Sensor node, MQTT, CoAP, XMPP -
Abstract
Background/Objectives: IoT developmental background: IoT, which is the key technology in the fourth industrial revolution, utilizes the Internet. Particularly, the growth of convergence products that utilize it has been constant with the demands of IoT services using the network of the Internet.
Methods/Statistical analysis: IoT network consists of products equipped with various sensors to communicate; sensor nodes are made up of low volume memory, low performance CPU, and battery when they are used in the network. There has been the demand of secure transmission of information measured by a sensor node to the IoT platform. We conduct a study on how we can improve security in the IoT environment.
Findings: Generally, sensor nodes are applied with basic security provided by IoT communication protocol rather than their own encryption. Therefore, sensor nodes are vulnerable in terms of security and the IoT platform that utilizes information collected by them would process distorted information.
In order to draw a strategy to prevent security breach, we analyze security threat and the type of attacks.
Improvements/Applications: We suggest a countermeasure to deal with security threat of sensor nodes and situations in which sensor nodes are vulnerable in IoT environment. To secure integrity of communication and transaction between a sensor node and an IoT platform in the future, the application of block chain technology into the IoT environment is necessary.
Â
-
References
[1] Saha, H. N., Mandal, A., & Sinha, A. (2017, January). Recent trends in the Internet of Things. In Computing and Communication Workshop and Conference (CCWC), 2017 IEEE 7th Annual (pp. 1-4). IEEE.
[2] Lea, R., & Blackstock, M. (2014, December). City hub: A cloud-based iot platform for smart cities. In Cloud Computing Technology and Science (CloudCom), 2014 IEEE 6th International Conference on (pp. 799-804). IEEE.
[3] Yang, G., Xie, L., Mäntysalo, M., Zhou, X., Pang, Z., Da Xu, L., ...& Zheng, L. R. (2014). A health-iot platform based on the integration of intelligent packaging, unobtrusive bio-sensor, and intelligent medicine box. IEEE transactions on industrial informatics, 10(4), 2180-2191.
[4] Mishra, N., Lin, C. C., & Chang, H. T. (2015). A cognitive adopted framework for IoT big-data management and knowledge discovery prospective. International Journal of Distributed Sensor Networks, 11(10), 718390.
[5] Fantacci, R., Pecorella, T., Viti, R., & Carlini, C. (2014, March). Short paper: Overcoming IoT fragmentation through standard gateway architecture. In Internet of Things (WF-IoT), 2014 IEEE World Forum on (pp. 181-182). IEEE.
[6] Maarala, A. I., Su, X., & Riekki, J. (2017). Semantic reasoning for context-aware Internet of Things applications. IEEE Internet of Things Journal, 4(2), 461-473.
[7] Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal, 4(5), 1125-1142.
[8] Bertino, E., & Islam, N. (2017). Botnets and internet of things security. Computer, 50(2), 76-79.
[9] Tang, K., Wang, Y., Liu, H., Sheng, Y., Wang, X., & Wei, Z. (2013, September). Design and implementation of push notification system based on the MQTT protocol. In International Conference on Information Science and Computer Applications (ISCA 2013) (pp. 116-119).
[10] Hunkeler, U., Truong, H. L., & Stanford-Clark, A. (2008, January). MQTT-S—A publish/subscribe protocol for Wireless Sensor Networks. In Communication systems software and middleware and workshops, 2008. comsware 2008. 3rd international conference on (pp. 791-798). IEEE.
[11] Rahman, R. A., & Shah, B. (2016, March). Security analysis of IoT protocols: A focus in CoAP. In Big Data and Smart City (ICBDSC), 2016 3rd MEC International Conference on (pp. 1-7). IEEE.
[12] Saint-Andre, P. (2011). Extensible messaging and presence protocol (XMPP): Core.Retrieved fromhttps://tools.ietf.org/html/rfc6120.html
[13] Li, B., & Yu, J. (2011). Research and application on the smart home based on component technologies and Internet of Things. Procedia Engineering, 15, 2087-2092.
[14] Bécsi, T., Aradi, S., & Gáspár, P. (2015, June). Security issues and vulnerabilities in connected car systems. In Models and Technologies for Intelligent Transportation Systems (MT-ITS), 2015 International Conference on (pp. 477-482). IEEE.
[15] Pienaar, J. P., Fisher, R. M., & Hancke, G. P. (2015, July). Smartphone: The key to your connected smart home. In Industrial Informatics (INDIN), 2015 IEEE 13th International Conference on (pp. 999-1004). IEEE.
-
Downloads
-
How to Cite
Ju, Y., & Jin Mun, H. (2018). The Research on Security Technology for Low-Performance Iot Sensor Node. International Journal of Engineering & Technology, 7(3.34), 594-597. https://doi.org/10.14419/ijet.v7i3.34.19389Received date: 2018-09-09
Accepted date: 2018-09-09
Published date: 2018-09-01