Internet of things (IoT): a survey on protocols and security risks

  • Authors

    • R H Aswathy
    • N Malarvizhi
    2018-02-05
    https://doi.org/10.14419/ijet.v7i1.7.9380
  • Internet of Things (IoT), Constrained Application Protocols (CoAP), DoS (Denial of Service), Bandwidth Constraint, Node Capture.
  • Abstract

    A dramatic change by the growth of new ubiquitous computing, our globe is moving towards the fully connected paradigm called Internet of Things (IoT). The world is being connected and interlinked with the exponential growth of this pervasive technology. It plays a significant role in many fields such as healthcare, manufacturing industry, agriculture, transportation, smart homes etc and reinforces our everyday life. It acts as an aegis for covering all the factors such as protocols, key elements, technologies etc. IoT includes many capabilities and numerous mechanisms but protection hassle that slow down the era. In this paper we discussed about essential protocols and security issues of IoT.

  • References

    1. [1] Ashton k. That ‘Internet of Things’ thing. RFID Journal, vol. 22, no. 7, pp. 97–114, 2009.

      [2] Ala Al-Fuqaha,Mohsen Guizani, Mehdi Mohammadi, Mohammed Aledhari and Moussa Ayyash, “Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications†Vol. 17, No. 4, Fourth Quarter 2015.

      [3] G. Brumfiel, "First Eyes inside Nuclear Plant May Be A Robot's," NPR, March 23, 2011.

      [4] Winnie Kurien,â€Internet of Things (IoT) & It’s Challenges†(IJARCET) Volume 5, Issue 5, May 2016

      [5] Open Auto Alliance, Oct. 20, 2014. Available: http://www. openautoalliance.net

      [6] J. Gantz and D. Reinsel, “The digital universe in 2020: Big data, bigger digital shadows, and biggest growth in the far east,†IDC iView: IDC Anal. Future, vol. 2007, pp. 1–16, Dec. 2012.

      [7] J. Manyika et al., Disruptive Technologies: Advances that Will Transform Life, Business, and the Global Economy. San Francisco, CA, USA: McKinsey Global Instit., 2013.

      [8] Mahmoud Shuker Mahmoud, Auday A. H. Mohamad,†A Study of Efficient Power Consumption Wireless Communication Techniques/ Modules for Internet of Things (IoT) Applicationsâ€, AIT, Vol.6 No.2, April 2016http://creativecommons.org/licenses/by/4.0

      [9] D. Locke, “MQ telemetry transport (MQTT) v3.1.1 protocol specification,†IBM developerWorks, Markham, ON,Canada, Tech. Lib., 2010.[Online].Available:Http://Www.Ibm.Com/Developerworks/ Webservices/Library/Ws-Mqtt/Index.Html

      [10] P.Saint Andrea,Ed,Jabber â€Extensible Messaging Presence Protocol(XMPP)â€software foundation,October 2004. https://xmpp.org/rfcs/rfc3920.html

      [11] M. T. Jones, "Meet the Extensible Messaging and Presence Protocol (XMPP)," developerWorks, 2009. https://www.ibm.com/developerworks/library/x-xmppintro/index.html.

      [12] Z. Shelby, K. Hartke †The Constrained Application Protocol (CoAP) “ ISSN: 2070-1721 C. BormannInternet Engineering Task Force (IETF) , https://tools.ietf.org/html/rfc7252.

      [13] †Advanced Message or Queuing Protocol†AMQP-Protocol specification Version 0-9-1, 13 November 2008, https://www.rabbitmq.com/resources/specs/amqp0-9-1.pdf

      [14] OASIS Standard, "OASIS Advanced Message Queuing Protocol (AMQP) Version 1.0," 2012. http://docs.oasis-open.org/amqp/core/v1.0/os/amqp-core-complete-v1.0-os.pdf

      [15] Sye Keoh,Sandeep S Kumar and Hannes Tschofenig,â€Securing the Internet of Things:A Standardization perspective,IEEE Internet of Things Journal,VOL 1,No 3,June 2014

      [16] Rodrigo Roman,Jianying and Javier Lopez,â€On the features and challenges of security and privacy in distributed Internet of Things†Volume: 1, Issue: 3, June 2014, Page(s): 265 – 275, ISSN: 2327 4662, http:www. elsevier. com/locate/comnet.

      [17] Josh Broch David A. Maltz David B. Johnson Yih-Chun Hu Jorjeta Jetcheva,â€A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols†ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom’98), October 25–30, 1998, Dallas, Texas, USA. http:// www.monarch. cs.cmu.edu.

      [18] YANG Jin-cui,FANG Bin-xing,â€Security model and Key technologies for Internet of Things,ScienceDirect, 2011 December. www.sciencedirect.com/science/journal/10058885. https://doi.org/10.1016/S1005-8885(10)60159-8.

      [19] Mitali Mahadev Raut, 2Ruchira Rajesh Sable, 3 Shrutika Rajendra Toraskar,â€Internet of Things (IOT) Based Smart Grid,â€, (IJETT) – Volume 34 Number 1- April 2016,ISSN:2231-5381.

      [20] Sungwook Kim,â€Asymptotic shapley value based resource allocation scheme for IoT servicesâ€, Computer Networks 100 (2016) 55–63,www.elsevier.com/locate/comnet,2016. https://doi.org/10.1016/j.comnet.2016.02.021.

      [21] Mohamed Abomhara and Geir M. Køien,â€Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks†17 April 2015; Journal of Cyber Security, Vol. 4, 65–88. https://doi.org/10.13052/jcsm2245-1439.414.

      [22] Thamer A. Alghamdi, Aboubaker Lasebae, Mahdi Aiash,†Security Analysis of the Constrained Application Protocol in the Internet of Thingsâ€, IEEE FGCT,17 March 2013, https://www.researchgate.net/publication/259869307. https://doi.org/10.1109/FGCT.2013.6767217.

  • Downloads

  • How to Cite

    Aswathy, R. H., & Malarvizhi, N. (2018). Internet of things (IoT): a survey on protocols and security risks. International Journal of Engineering & Technology, 7(1.7), 15-20. https://doi.org/10.14419/ijet.v7i1.7.9380

    Received date: 2018-02-04

    Accepted date: 2018-02-04

    Published date: 2018-02-05