The Internet of Things: New Interoperability, Management and Security Challenges

The Internet of Things (IoT) brings connectivity to about every objects found in the physical space. It extends connectivity to everyday objects. From connected fridges, cars and cities, the IoT creates opportunities in numerous domains. However, this increase in connectivity creates many prominent challenges. This paper provides a survey of some of the major issues challenging the widespread adoption of the IoT. Particularly, it focuses on the interoperability, management, security and privacy issues in the IoT. It is concluded that there is a need to develop a multifaceted technology approach to IoT security, management, and privacy.

[1]  Huirong Fu,et al.  Design and implementation of an intrusion detection system for wireless sensor networks , 2007, 2007 IEEE International Conference on Electro/Information Technology.

[2]  Sushil Jajodia,et al.  A logic-based framework for attribute based access control , 2004, FMSE '04.

[3]  Michael Blackstock,et al.  Toward interoperability in a web of things , 2013, UbiComp.

[4]  Klaus Wehrle,et al.  Security Challenges in the IP-based Internet of Things , 2011, Wirel. Pers. Commun..

[5]  Saman Taghavi Zargar,et al.  A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.

[6]  Charu C. Aggarwal,et al.  The Internet of Things: A Survey from the Data-Centric Perspective , 2013, Managing and Mining Sensor Data.

[7]  Hui Xiong,et al.  Enhancing Security and Privacy in Traffic-Monitoring Systems , 2006, IEEE Pervasive Computing.

[8]  P. Venkata Krishna,et al.  A Learning Automata Based Solution for Preventing Distributed Denial of Service in Internet of Things , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.

[9]  Qian Zhu,et al.  IOT Gateway: BridgingWireless Sensor Networks into Internet of Things , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[10]  Adam P. Arkin,et al.  Data and Databases , 2007 .

[11]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.

[12]  Rodrigo Roman,et al.  Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..

[13]  Yen-Kuang Chen,et al.  Challenges and opportunities of internet of things , 2012, 17th Asia and South Pacific Design Automation Conference.

[14]  Jalel Ben-Othman,et al.  Detecting DoS attacks in WSN based on clustering technique , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).

[15]  Catherine Pelachaud,et al.  Emotion-Oriented Systems , 2011 .

[16]  Bo Yang,et al.  Efficient naming, addressing and profile services in Internet-of-Things sensory environments , 2014, Ad Hoc Networks.

[17]  Ru-chuan Wang,et al.  An efficient authentication and access control scheme for perception layer of Internet of Things , 2014 .

[18]  Hon Cheung,et al.  A review of mobile location privacy in the Internet of Things , 2012, 2012 Tenth International Conference on ICT and Knowledge Engineering.

[19]  Jiafu Wan,et al.  Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[20]  Jing Li,et al.  An Authorization Management Approach in the Internet of Things , 2012 .

[21]  Shuang-Hua Yang,et al.  How the internet of things technology enhances emergency response operations , 2013 .

[22]  Matt Welsh,et al.  Programming Sensor Networks Using Abstract Regions , 2004, NSDI.

[23]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[24]  Najah AbuAli,et al.  Data management for the Internet of Things: Green directions , 2012, 2012 IEEE Globecom Workshops.

[25]  Mahmoud Elkhodr,et al.  The Internet of Things: Vision & challenges , 2013, IEEE 2013 Tencon - Spring.

[26]  A. K. Dwivedi,et al.  Exploration of Existing Frameworks for Connecting Wireless Sensor Networks (WSNs) with Current Internet , 2014 .

[27]  D. Richard Kuhn,et al.  Adding Attributes to Role-Based Access Control , 2010, Computer.

[28]  Felix Wortmann,et al.  Internet of Things , 2015, Business & Information Systems Engineering.

[29]  Ilias Maglogiannis,et al.  Bringing IoT and Cloud Computing towards Pervasive Healthcare , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[30]  Gang Gan,et al.  Internet of Things Security Analysis , 2011, 2011 International Conference on Internet Technology and Applications.

[31]  Peter Reiher,et al.  A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.

[32]  Peter Bernus,et al.  Analysis of Interoperability in the Queensland Disaster Management System , 2013, ICEIS.

[33]  Cristina Alcaraz,et al.  Key management systems for sensor networks in the context of the Internet of Things , 2011, Comput. Electr. Eng..

[34]  Mahmoud Elkhodr,et al.  A semantic obfuscation technique for the Internet of Things , 2014, 2014 IEEE International Conference on Communications Workshops (ICC).

[35]  Abdul Qayoom Bhat,et al.  Study of Wireless Sensor Networks its Routing Challenges and Available Sensor Nodes , 2013 .