A systematic Study of Security Challenges and Infrastructures for Internet of Things
-
2018-12-09 https://doi.org/10.14419/ijet.v7i4.36.24226 -
. -
Abstract
The proliferation of smart objects with capability of sensing, processing and communication has grown in recent years. In this scenario, the Internet of Things (IoT) connects these objects to the Internet and provides communication with users and devices. IoT enables a huge amount of new applications, with which academics and industries can benefit, such as smart cities, health care and automation. In this environment, compose of constrained devices, the widespread adoption of this paradigm depends of security requirements like secure communication between devices, privacy and anonymity of its users. This paper presents the main security challenges and solutions to provide authentication and authorization on the Internet of Things.
Â
-
References
[1] Communities, “Future networks and the internet: Early challenges regarding the internet of thingsâ€, Technical report, CTEC, (2008).
[2] Atzori L, Iera A & Morabito G, “The internet of things: A surveyâ€, Computer Networks, (2010), pp.2787–2805.
[3] Gubbi J, Buyya R, Marusic S & Palaniswami M, “Internet of things (IoT): A vision, architectural elements, and future directionsâ€, Future Generation Computer Systems, (2013), pp.1645–1660.
[4] Guinard D & Trifa V, “Towards the web of things: Web mashups for embedded devicesâ€, Workshop on Mashups, Enterprise Mashups and Lightweight Composition on the Web, Vol.15, (2009), pp.1-8.
[5] Babar S, Stango A, Prasad N, Sen J & Prasad R, “Proposed embedded security framework for internet of things (iot)â€, 2nd IEEE International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, (2011), pp.1–5.
[6] Xiang C & Li X, “General analysis on architecture and key technologies about internet of thingsâ€, IEEE 3rd International Conference on Software Engineering and Service Science (ICSESS), (2012), pp.325–328.
[7] Schaffers H, Komninos N, Pallot M, Trousse B, Nilsson M & Oliveira A, “Smart cities and the future internet: Towards cooperation frameworks for open innovationâ€, Lecture Notes in Computer Science, The Future Internet, Vol.6656, (2011), pp.431–446.
[8] Hummen R, Ziegeldorf JH, Shafagh H, Raza S & Wehrle K, “Towards viable certificate-based authentication for the internet of thingsâ€, 2nd ACM workshop on Hot topics on wireless network security and privacy, (2013), pp.37–42.
[9] Mahalle P, Babar S, Prasad NR & Prasad R, “Identity management framework towards internet of things (iot): Roadmap and key challengesâ€, Recent Trends in Network Security and Applications, (2010), pp.430–439.
[10] Fongen A, “Identity management and integrity protection in the internet of thingsâ€, Third IEEE International Conference on Emerging Security Technologies (EST), (2012), pp.111–114.
[11] Mahalle PN, Anggorojati B, Prasad NR & Prasad R, “Identity establishment and capability based access control (iecac) scheme for internet of thingsâ€, IEEE 15th International Symposium on Wireless Personal Multimedia Communications (WPMC), (2012), pp.187–191.
[12] Hanumanthappa P & Singh S, “Privacy preserving and ownership authentication in ubiquitous computing devices using secure three way authenticationâ€, IEEE International Conference on Innovations in Information Technology (IIT), (2012), pp.107–112.
[13] Roman R, Najera P & Lopez J, “Securing the internet of thingsâ€, Computer, Vol.44, No.9, (2011b), pp.51–58.
[14] Alam S, Chowdhury MM & Noll J, “Interoperability of security-enabled internet of thingsâ€, Wireless Personal Communications, Vol.61, No.3, (2011), pp.567–586.
[15] Babar S, Mahalle P, Stango A, Prasad NR & Prasad R, “Proposed security model and threat taxonomy for the internet of things (iot)â€, In Volume 89 of Communications in Computer and Information Science, (2010), pp.420–429.
[16] Xu X, “Research on safety certification and control technology in internet of thingsâ€, IEEE Fourth International Conference on Computational and Information Sciences (ICCIS), (2012), pp.518–521.
[17] Akram H & Hoffmann M, “Laws of identity in ambient environments: The hydra approachâ€, IEEE Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, (2008a), pp.367–373.
[18] Jindou J, Xiaofeng Q & Cheng C, “Access control method for web of things based on role and SNSâ€, IEEE 12th International Conference on Computer and Information Technology (CIT), (2012), pp.316–321.
[19] Liu J, Xiao Y & Chen CP, “Authentication and access control in the internet of thingsâ€, 32nd International Conference on Distributed Computing Systems Workshops, (2012), pp.588–592.
[20] Conzon D, Bolognesi T, Brizzi P, Lotito A, Tomasi R & Spirito MA, “The virtus middleware: An xmpp based architecture for secure IoT communicationsâ€, 21st IEEE International Conference on Computer Communications and Networks, (2012), pp.1–6.
[21] Bonetto R, Bui N, Lakkundi V, Olivereau A, Serbanati A & Rossi M, “Secure communication for smart IoT objects: Protocol stacks, use cases and practical examplesâ€, IEEE International Symposium on World of Wireless, Mobile and Multimedia Networks, (2012), pp.1–7.
[22] Mahalle PN, Anggorojati B, Prasad NR & Prasad R, “Identity authentication and capability based access control (iacac) for the internet of thingsâ€, Journal of Cyber Security and Mobility, Vol.1, No.4, (2013a), pp.309–348.
[23] Jara AJ, Marin L, Skarmeta AF, Singh D, Bakul G & Kim D, “Secure mobility management scheme for 6lowpan id/locator split architectureâ€, IEEE Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, (2011), pp.310–315.
[24] Nguyen TD, Al-Saffar A & Huh EN, “A dynamic id-based authentication schemeâ€, IEEE Sixth International Conference on Networked Computing and Advanced Information Management (NCM), (2010), pp.248–253.
[25] Li N, Wang Q & Deng Z, “Authentication framework of iiedns based on ldap & Kerberosâ€, 3rd IEEE International Conference on Broadband Network and Multimedia Technology, (2010), pp.695–699.
[26] Konidala DM, Duc DN, Lee D & Kim K, “A capability-based privacy- preserving scheme for pervasive computing environmentsâ€, Third IEEE International Conference on Pervasive Computing and Communications Workshops, (2005), pp.136–140.
[27] Kothmayr T, Schmitt C, Hu W, Brunig M & Carle G, “A dtls based end-to-end security architecture for the internet of things with two-way authenticationâ€, IEEE 37th Conference on Local Computer Networks Workshops, (2012), pp.956–963.
[28] Guinard D, Fischer M & Trifa V, “Sharing using social networks in a composable web of thingsâ€, 8th IEEE International Conference on Pervasive Computing and Communications Workshops, (2010), pp.702–707.
[29] Zhang G & Liu J, “A model of workflow-oriented attributed based access controlâ€, International Journal of Computer Network and Information Security (IJCNIS), Vol.3, No.1, (2011), pp.47–53.
-
Downloads
-
How to Cite
Koteswara Rao, N., & Swain, G. (2018). A systematic Study of Security Challenges and Infrastructures for Internet of Things. International Journal of Engineering & Technology, 7(4.36), 700-706. https://doi.org/10.14419/ijet.v7i4.36.24226Received date: 2018-12-18
Accepted date: 2018-12-18
Published date: 2018-12-09