Security Challenges in Internet of Things (IoT)

With the mounting prominence of the internet, secure transmission of information is crucial. The paper primarily focuses on recent research trends in security and privacy of Internet of Things (IoT).The benefits IoT has delivered is immense but at the cost of data security. Characteristics, architecture and limitations of IoT has been conferred for improved understanding for the readers. Security, privacy and trust has become a serious matter of concern with the increasing number of IoT. The authors have also addressed a numbers of security challenges in IoT like encryption, key distribution, PKI, trust, etc.

[1]  Matt Welsh,et al.  Sensor networks for emergency response: challenges and opportunities , 2004, IEEE Pervasive Computing.

[2]  Bhaskar Mondal,et al.  An Improved Cryptography Scheme for Secure Image Communication , 2013 .

[3]  Sushil Jajodia,et al.  Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact , 2014, IEEE Transactions on Information Forensics and Security.

[4]  Sana Hoor Jokhio,et al.  Light-weight framework for security-sensitive wireless sensor networks applications , 2013, IET Wirel. Sens. Syst..

[5]  Carsten Bormann,et al.  Terminology for Constrained-Node Networks , 2014, RFC.

[7]  Niraj K. Jha,et al.  Energy comparison and optimization of wireless body-area network technologies , 2007, BODYNETS.

[8]  Jianliang Xu,et al.  p-Sensitivity: A Semantic Privacy-Protection Model for Location-based Services , 2008, 2008 Ninth International Conference on Mobile Data Management Workshops, MDMW.

[9]  Daojing He,et al.  A Novel and Lightweight System to Secure Wireless Medical Sensor Networks , 2014, IEEE Journal of Biomedical and Health Informatics.

[10]  Bibhudatta Sahoo,et al.  Energy Efficient Heuristic Resource Allocation for Cloud Computing , 2014 .

[11]  Hevin Rajesh Dhasian,et al.  Survey of data aggregation techniques using soft computing in wireless sensor networks , 2013 .

[12]  Jianliang Xu,et al.  Protecting Location Privacy against Location-Dependent Attacks in Mobile Services , 2012, IEEE Transactions on Knowledge and Data Engineering.

[13]  Bibhudatta Sahoo,et al.  A Genetic Algorithmic approach for Energy Efficient Task Consolidation in Cloud Computing , 2015 .

[14]  Alessio Merlo,et al.  A survey on energy-aware security mechanisms , 2015, Pervasive Mob. Comput..

[15]  Steven Furnell,et al.  Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions , 2015, J. Netw. Comput. Appl..

[16]  Athanasios V. Vasilakos,et al.  ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.

[17]  S. Arunkumar,et al.  A review paper on preserving privacy in mobile environments , 2015, J. Netw. Comput. Appl..

[18]  Elisa Bertino,et al.  Effective Key Management in Dynamic Wireless Sensor Networks , 2015, IEEE Transactions on Information Forensics and Security.

[19]  Yong Wang,et al.  A fast privacy-preserving framework for continuous location-based queries in road networks , 2015, J. Netw. Comput. Appl..

[20]  Bhaskar Mondal,et al.  A MULTILEVEL SECURITY SCHEME USING CHAOS BASED ENCRYPTION AND STEGANOGRAPHY FOR SECURE AUDIO COMMUNICATION , 2013 .

[21]  Tao Zhou,et al.  Evolution of the Internet and its cores , 2008 .

[22]  Ravi Sankar,et al.  A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.

[23]  Ashok Kumar Das,et al.  A robust anonymous biometric-based remote user authentication scheme using smart cards , 2015, J. King Saud Univ. Comput. Inf. Sci..

[24]  Michele Magno,et al.  Ensuring Survivability of Resource-Intensive Sensor Networks Through Ultra-Low Power Overlays , 2014, IEEE Transactions on Industrial Informatics.

[25]  Athanasios V. Vasilakos,et al.  A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..

[26]  S. Seksena,et al.  A novel addition based image sharing scheme for secure communication of highly secret images , 2013, 2013 Annual International Conference on Emerging Research Areas and 2013 International Conference on Microelectronics, Communications and Renewable Energy.

[27]  Jun Wang,et al.  A Reputation Model Based on Behavior Trust in Wireless Sensor Networks , 2009, 2009 International Conference on Scalable Computing and Communications; Eighth International Conference on Embedded Computing.

[28]  Bilhanan Silverajan,et al.  IPv6 Addressing Strategies for IoT , 2013, IEEE Sensors Journal.