Present Scenarios of IoT Projects with Security Aspects Focused

To explore IoT’s hidden prospective and to address many global complications, the International Telecommunication Union (ITU) is working. They are making the IoT standardized for several years in the Telecommunication Standardization Sector (ITU-T). ITU-T Study Group 20 was formed in recent times, to further endorse coordinated advancement of global IoT technologies, services, and applications. Some of the important IoT projects, their security pitfalls and their applications domains are discussed here. We need some secure architecture. Case by case, we need multi-layer architectures for secure IoT, such as in the smart city environs; we have numerous protocols, access technologies, functions and several types of nodes. Universally, future focuses in the security issues of the Internet of Things would typically quintessence on the following features, related laws for the security of the Internet of Things, the open security system, terminal security function, individual privacy protection mode, etc. We have developed a Secure Hybrid RSA (SHRSA) messaging system for End to End encrypted messaging, with solutions to many bottlenecks of RSA and Instant messaging schemes. Our scheme has much more decryption efficiency. Presently we have used our Secure Hybrid RSA (SHRSA) cipher for secure and efficient messaging scheme. We have found in real-time testing results analysis that, our scheme is much more authentic, efficient and secure system. So as a cipher Secure Hybrid RSA (SHRSA) cipher can be used in present IoT communications and in near future in Future Internet of everything (IoE) communications.

[1]  Athanasios V. Vasilakos,et al.  A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..

[2]  Xiaolin Gui,et al.  Research on social relations cognitive model of mobile nodes in Internet of Things , 2013, J. Netw. Comput. Appl..

[3]  Shiuh-Pyng Shieh,et al.  Emerging Security Threats and Countermeasures in IoT , 2015, AsiaCCS.

[4]  Maurizio A. Spirito,et al.  DEMO: An IDS framework for internet of things empowered by 6LoWPAN , 2013, CCS.

[5]  Lingling Gao,et al.  A unified perspective on the factors influencing consumer acceptance of internet of things technology , 2014 .

[6]  Ru-chuan Wang,et al.  An efficient authentication and access control scheme for perception layer of Internet of Things , 2014 .

[7]  David M. Eyers,et al.  Policy enforcement within emerging distributed, event-based systems , 2014, DEBS '14.

[8]  Giuseppe Piro,et al.  A standard compliant security framework for IEEE 802.15.4 networks , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).

[9]  Jiang Tao Geng,et al.  Research on Mobile Information Access Based on Internet of Things , 2014 .

[10]  Jörg Daubert,et al.  A view on privacy & trust in IoT , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).

[11]  Antonio F. Gómez-Skarmeta,et al.  Secure and scalable mobility management scheme for the Internet of Things integration in the future internet architecture , 2013, Int. J. Ad Hoc Ubiquitous Comput..

[12]  Alexandre Santos,et al.  Security architecture for mobile e-health applications in medication control , 2013, 2013 21st International Conference on Software, Telecommunications and Computer Networks - (SoftCOM 2013).

[13]  Soma Bandyopadhyay,et al.  IoT-Privacy: To be private or not to be private , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[14]  Sylvain Kubler,et al.  A standardized approach to deal with firewall and mobility policies in the IoT , 2015, Pervasive Mob. Comput..

[15]  Luigi Atzori,et al.  The problem of task allocation in the Internet of Things and the consensus-based approach , 2014, Comput. Networks.

[16]  Jianqing Zhang,et al.  Performance evaluation of Attribute-Based Encryption: Toward data privacy in the IoT , 2014, 2014 IEEE International Conference on Communications (ICC).

[17]  Jing Wang,et al.  On mapping of address and port using translation , 2019, Int. J. Inf. Comput. Secur..

[18]  Young-Sik Jeong,et al.  An Efficient and Secure m-IPS Scheme of Mobile Devices for Human-Centric Computing , 2014, J. Appl. Math..

[19]  Xing Li,et al.  Mapping of Address and Port using Translation (MAP-T) , 2015 .

[20]  Ahmad-Reza Sadeghi,et al.  Security and privacy challenges in industrial Internet of Things , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).

[21]  Xing Li,et al.  Hybrid RSA-based highly efficient, reliable and strong personal full mesh networked messaging scheme , 2018 .

[22]  Xing Li,et al.  Secure IoT Structural Design for Smart Homes , 2019, Smart Cities Cybersecurity and Privacy.

[23]  Lilian Bossuet,et al.  New paradigms for access control in constrained environments , 2014, 2014 9th International Symposium on Reconfigurable and Communication-Centric Systems-on-Chip (ReCoSoC).

[24]  Ilsun You,et al.  ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things , 2014, Future Gener. Comput. Syst..

[25]  Jing Wang,et al.  An end-to-end user two-way authenticated double encrypted messaging scheme based on hybrid RSA for the future internet architectures , 2018, Int. J. Inf. Comput. Secur..

[26]  Julita Vassileva,et al.  Collaboration technology in teams and organizations: Introduction to the special issue , 2016, Inf. Syst. Frontiers.

[27]  Daniele Miorandi,et al.  A security-and quality-aware system architecture for Internet of Things , 2014, Information Systems Frontiers.

[28]  Ricardo Neisse,et al.  Enforcement of security policy rules for the Internet of Things , 2014, 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[29]  Yu-Hung Huang,et al.  A lightweight authentication protocol for Internet of Things , 2014, 2014 International Symposium on Next-Generation Electronics (ISNE).

[30]  Mahdi Ben Alaya,et al.  Architecting information centric ETSI-M2M systems , 2014, 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS).

[31]  Andrea Zanella,et al.  Internet of Things for Smart Cities , 2014, IEEE Internet of Things Journal.

[32]  Kuo-Ching Liu,et al.  A privacy and authentication protocol for mobile RFID system , 2014 .

[33]  Marko Hölbl,et al.  A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion , 2014, Ad Hoc Networks.

[34]  Félix Gómez Mármol,et al.  Dynamic and flexible selection of a reputation mechanism for heterogeneous environments , 2015, Future Gener. Comput. Syst..

[35]  Hwa-Young Jeong,et al.  Numeric Analysis for Relationship-Aware Scalable Streaming Scheme , 2014, J. Appl. Math..

[36]  Cinzia Cappiello,et al.  A NFP Model for Internet of Things applications , 2014, 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[37]  Edna Dias Canedo,et al.  Proposal of a secure, deployable and transparent middleware for Internet of Things , 2014, CISTI 2014.

[38]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[39]  Jing Wang,et al.  Strong, efficient and reliable personal messaging peer to peer architecture based on Hybrid RSA , 2016, ICC 2016.

[40]  Evangelos N. Gazis,et al.  Security Perspectives for Collaborative Data Acquisition in the Internet of Things , 2014, IoT360.

[41]  Wang Ruchuan,et al.  Privacy Protection Based on Key-changed Mutual Authentication Protocol in Internet of Things , 2013 .

[42]  Bin Sun,et al.  Trust management mechanism for Internet of Things , 2014 .

[43]  Diego López-de-Ipiña,et al.  Otsopack: Lightweight semantic framework for interoperable ambient intelligence applications , 2014, Comput. Hum. Behav..

[44]  Cong Wang,et al.  Security and privacy mechanism for health internet of things , 2013 .

[45]  Peng Gong,et al.  A secure handshake scheme for mobile-hierarchy city intelligent transportation system , 2013, 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN).