Aspects of Application Security for Internet of Things Systems

Year by year the solutions associated with the idea of Internet of Things (IoT) gaining in popularity. Internet of Things is a term describing the concepts of network connections between objects that may directly or indirectly collect, process and exchange data via computer networks. It is important to establish new standards of data management as well as create mobile and IoT applications extending the functionalities of IoT systems to enable the users to benefit from the newest technological advances. Addressing these tendencies the paper presents some sensitivities of mobile applications that could compromise the safety of IoT and several methods of dealing with these problems.

[1]  V. Mahesh,et al.  Internet of Things - a study on the security challenges , 2015, 2015 IEEE International Advance Computing Conference (IACC).

[2]  Heena Rathore,et al.  Bio-inspired machine learning based Wireless Sensor Network security , 2013, 2013 World Congress on Nature and Biologically Inspired Computing.

[3]  Özgür B. Akan,et al.  A survey on bio-inspired networking , 2010, Comput. Networks.

[4]  T. Kramp,et al.  Introduction to the Internet of Things , 2013 .

[5]  Amala V. Rajan,et al.  Internet of Things (IoT): Application systems and security vulnerabilities , 2016, 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA).

[6]  Anmol Misra,et al.  Android Security: Attacks and Defenses , 2013 .

[7]  Peter Friess,et al.  Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems , 2013 .

[8]  Azween Abdullah,et al.  Biologically Inspired Model for Securing Hybrid Mobile Ad hoc Networks , 2008 .

[9]  Ran Canetti,et al.  Obfuscating Point Functions with Multibit Output , 2008, EUROCRYPT.

[10]  Eduardo Serrano,et al.  Internet of Intelligent Things: Bringing Artificial Intelligence into Things and Communication Networks , 2014 .

[11]  Udai Pratap Rao,et al.  Internet of Things — Architecture, applications, security and other major challenges , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).

[12]  Reshma Banu,et al.  A review on biologically inspired approaches to security for Internet of Things (IoT) , 2016, 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT).

[13]  Nir Bitansky,et al.  On Strong Simulation and Composable Point Obfuscation , 2010, CRYPTO.

[14]  Francis daCosta Rethinking the Internet of Things: A Scalable Approach to Connecting Everything , 2014 .

[15]  Marco Torchiano,et al.  The effectiveness of source code obfuscation: An experimental assessment , 2009, 2009 IEEE 17th International Conference on Program Comprehension.

[16]  Aneta Poniszewska-Marańda,et al.  Security risks and their prevention capabilities in mobile application development , 2015 .

[17]  Lixia Zhang,et al.  A taxonomy of biologically inspired research in computer networking , 2010, Comput. Networks.

[18]  Martin Fleury,et al.  Multimedia security perspectives in IoT , 2016, 2016 Sixth International Conference on Innovative Computing Technology (INTECH).

[19]  Koen De Bosschere,et al.  On the Effectiveness of Source Code Transformations for Binary Obfuscation , 2006, Software Engineering Research and Practice.

[20]  Adrian McEwen,et al.  Designing the Internet of Things , 2013 .

[21]  Robert C. Atkinson,et al.  Threat analysis of IoT networks using artificial neural network intrusion detection system , 2016, 2016 International Symposium on Networks, Computers and Communications (ISNCC).

[22]  Amit Sahai,et al.  On the (im)possibility of obfuscating programs , 2001, JACM.

[23]  Wang Xi,et al.  Research on IoT Privacy Security Risks , 2016, 2016 International Conference on Industrial Informatics - Computing Technology, Intelligent Technology, Industrial Information Integration (ICIICII).

[24]  Yael Tauman Kalai,et al.  On Symmetric Encryption and Point Obfuscation , 2010, TCC.