Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33103
Security of Internet of Things: Challenges, Requirements and Future Directions
Authors: Amjad F. Alharbi, Bashayer A. Alotaibi, Fahd S. Alotaibi
Abstract:
The emergence of Internet of Things (IoT) technology provides capabilities for a huge number of smart devices, services and people to be communicate with each other for exchanging data and information over existing network. While as IoT is progressing, it provides many opportunities for new ways of communications as well it introduces many security and privacy threats and challenges which need to be considered for the future of IoT development. In this survey paper, an IoT security issues as threats and current challenges are summarized. The security architecture for IoT are presented from four main layers. Based on these layers, the IoT security requirements are presented to insure security in the whole system. Furthermore, some researches initiatives related to IoT security are discussed as well as the future direction for IoT security are highlighted.Keywords: Internet of Things, IoT, IoT security challenges, IoT security requirements, IoT security architecture.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1474881
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1202References:
[1] Mohamed Abomhara and Geir M Køien. Security and privacy in the internet of things: Current status and open issues. In Privacy and Security in Mobile Systems (PRISMS), 2014 International Conference on, pages 1–8. IEEE, 2014.
[2] Ioannis Andrea, Chrysostomos Chrysostomou, and George Hadjichristofi. Internet of things: Security vulnerabilities and challenges. In 2015 IEEE Symposium on Computers and Communication (ISCC), pages 180–187. IEEE, 2015.
[3] C Warren Axelrod. Enforcing security, safety and privacy for the internet of things. In Systems, Applications and Technology Conference (LISAT), 2015 IEEE Long Island, pages 1–6. IEEE, 2015.
[4] Sachin Babar, Parikshit Mahalle, Antonietta Stango, Neeli Prasad, and Ramjee Prasad. Proposed security model and threat taxonomy for the internet of things (iot). In International Conference on Network Security and Applications, pages 420–429. Springer, 2010.
[5] Jorge Bernal Bernabe, Jose Luis Hernández, M Victoria Moreno, and Antonio F Skarmeta Gomez. Privacy- preserving security framework for a social-aware internet of things. In International Conference on Ubiquitous Computing and Ambient Intelligence, pages 408–415. Springer, 2014.
[6] Eleonora Borgia. The internet of things vision: Key features, applications and open issues. Computer Communications, 54:1–31, 2014.
[7] MU Farooq, Muhammad Waseem, Anjum Khairi, and Sadia Mazhar. A critical analysis on the security concerns of internet of things (iot). International Journal of Computer Applications, 111(7), 2015.
[8] Glenn A Fink, Dimitri V Zarzhitsky, Thomas E Carroll, and Ethan D Farquhar. Security and privacy grand challenges for the internet of things. In Collaboration Technologies and Systems (CTS), 2015 International Conference on, pages 27–34. IEEE, 2015.
[9] Jayavardhana Gubbi, Rajkumar Buyya, Slaven Marusic, and Marimuthu Palaniswami. Internet of things (iot): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7):1645–1660,2013.
[10] KrishnaKanth Gupta and Sapna Shukla. Internet of things: Security challenges for next generation networks. In Innovation and Challenges in Cyber Security (ICICCS-INBUSH), 2016 International Conference on, pages 315–318. IEEE, 2016.
[11] Qi Jing, Athanasios V Vasilakos, Jiafu Wan, Jingwei Lu, and Dechao Qiu. Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8):2481–2501, 2014.
[12] J Sathish Kumar and Dhiren R Patel. A survey on internet of things: Security and privacy issues. International Journal of Computer Applications, 90(11), 2014.
[13] Sathish Alampalayam Kumar, Tyler Vealey, and Harshit Srivastava. Security in internet of things: Challenges, solutions and future directions. In 2016 49th Hawaii International Conference on System Sciences (HICSS), pages 5772–5781. IEEE, 2016.
[14] Marc Langheinrich. A privacy awareness system for ubiquitous computing environments. In international conference on Ubiquitous Computing, pages 237–245. Springer, 2002.
[15] Xiong Li, Zhou Xuan, and Liu Wen. Research on the architecture of trusted security system based on the internet of things. In Intelligent Computation Technology and Automation (ICICTA), 2011 International Conference on, volume 2, pages 1172–1175. IEEE, 2011.
[16] Arsalan Mohsen Nia and Niraj K Jha. A comprehensive study of security of internet-of-things. IEEE Transactions on Emerging Topics in Computing, 2016.
[17] Sabrina Sicari, Alessandra Rizzardi, Luigi Alfredo Grieco, and Alberto Coen-Porisini. Security, privacy and trust in internet of things: The road ahead. Computer Networks, 76:146–164, 2015.
[18] Girts Strazdins and Hao Wang. Open security and privacy challenges for the internet of things. In 2015 10th International Conference on Information, Communications and Signal Processing (ICICS), pages 1–4. IEEE, 2015.
[19] Hui Suo, Jiafu Wan, Caifeng Zou, and Jianqi Liu. Security in the internet of things: a review. In Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on, volume 3, pages 648–651. IEEE, 2012.
[20] Arijit Ukil, Jaydip Sen, and Sripad Koilakonda. Embedded security for internet of things. In Emerging Trends and Applications in Computer Science (NCETACS), 2011 2nd National Conference on, pages 1–6. IEEE, 2011.
[21] Pan Wang. The internet of things: a security point of view. Internet Research, 26(2):337–359, 2016.
[22] Mario Weber and Marija Boban. Security challenges of the internet of things. In Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2016 39th International Convention on, pages 638–643. Croatian Society MIPRO, 2016.
[23] Liang Zhou and Han-Chieh Chao. Multimedia traffic security architecture for the internet of things. IEEE Network, 25(3):35–40, 2011.