Security in the Internet of Things

In this chapter, the authors present a review of security requirements for IoT and provide an analysis of the possible attacks, security issues, and major security threats from the perspective of layers that comprise IoT. To overcome these limitations, the authors describe a security implementation challenges in IoT security. This chapter serves as a manual of security threats and issues of the IoT and proposes possible solutions and recommendations for improving security in the IoT environment.

[1]  Arkady B. Zaslavsky,et al.  Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[2]  Rodrigo Roman,et al.  Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..

[3]  Jiafu Wan,et al.  Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[4]  Fadi Al-Turjman,et al.  CAR Approach for the Internet of Things , 2016, Canadian Journal of Electrical and Computer Engineering.

[5]  Anjali Sardana,et al.  Identity management framework for cloud based internet of things , 2012, SecurIT '12.

[6]  Habtamu Abie,et al.  Towards metrics-driven adaptive security management in e-health IoT applications , 2012, BODYNETS.

[7]  Soma Bandyopadhyay,et al.  Why not keep your personal data secure yet private in IoT?: Our lightweight approach , 2015, 2015 IEEE Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).

[8]  Bryan Scotney,et al.  Smart City Architecture and its Applications Based on IoT , 2015, ANT/SEIT.

[9]  Roberto Di Pietro,et al.  Security in wireless ad-hoc networks - A survey , 2014, Comput. Commun..

[10]  Xu Xiaohui,et al.  Study on Security Problems and Key Technologies of the Internet of Things , 2013, 2013 International Conference on Computational and Information Sciences.

[11]  Zhi Chen,et al.  A lightweight attribute-based encryption scheme for the Internet of Things , 2015, Future Gener. Comput. Syst..

[12]  Lin Li,et al.  Research on PKI-like Protocol for the Internet of Things , 2013, 2013 Fifth International Conference on Measuring Technology and Mechatronics Automation.

[13]  Athanasios V. Vasilakos,et al.  Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.

[14]  Hafiz Farooq Ahmad,et al.  A lightweight message authentication scheme for Smart Grid communications in power sector , 2016, Comput. Electr. Eng..

[15]  Jari Veijalainen,et al.  Security and privacy threats in IoT architectures , 2012, BODYNETS.

[16]  Yang Lijun,et al.  Security Architecture and Key Technologies for IoT/CPS , 2011 .

[17]  Imrich Chlamtac,et al.  Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.

[18]  Hannu Tenhunen,et al.  International Conference on Ambient Systems , Networks and Technologies ( ANT 2015 ) SEA : A Secure and E ffi cient Authentication and Authorization Architecture for IoT-Based Healthcare Using Smart Gateways , 2015 .

[19]  Dorothy E. Denning Stuxnet: What Has Changed? , 2012, Future Internet.

[20]  Sathish Alampalayam Kumar,et al.  Security in Internet of Things: Challenges, Solutions and Future Directions , 2016, 2016 49th Hawaii International Conference on System Sciences (HICSS).

[21]  Rodrigo Roman,et al.  On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.

[22]  Athanasios V. Vasilakos,et al.  A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..

[23]  Susana Sargento,et al.  Scalable qos-aware mobility for future mobile operators , 2006, IEEE Communications Magazine.

[24]  Steven Furnell Making security usable: Are things improving? , 2007, Comput. Secur..

[25]  Do-Yeon Kim Cyber security issues imposed on nuclear power plants , 2014 .

[26]  Rolf H. Weber,et al.  Internet of things - Governance quo vadis? , 2013, Comput. Law Secur. Rev..

[27]  Sanggon Lee,et al.  Security Analysis and Improvements of Authentication and Access Control in the Internet of Things , 2014, Sensors.

[28]  Young-Sik Jeong,et al.  A secure and scalable storage system for aggregate data in IoT , 2015, Future Gener. Comput. Syst..

[29]  Ioannis Lambadaris,et al.  PRE-Fog: IoT trace based probabilistic resource estimation at Fog , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[30]  Jing Liu,et al.  Authentication and Access Control in the Internet of Things , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.

[31]  Manik Lal Das,et al.  RFID security in the context of "internet of things" , 2012, SecurIT '12.