Universal Layers of IoT Architecture and Its Security Analysis

Internet of Things (IoT)-based intelligent devices have been actively used in clouds to provide various data ranging from personal healthcare to disaster response. High acceptance rate of IoT devices resulting day-by-day increment in the number of Internet’s connected devices. The enormous growth of IoT devices and their reliability on wireless technologies make it vulnerable to cyberattacks which posing challenges for digital forensic experts. Security concern such as secure communication, access control, secure storage of information and privacy is major concern in IoT surroundings. The rapid growth of IoT services and devices resulted in the deployment of various insecure and vulnerable system. Furthermore, every single device including sensors that deployed in IoT network and each byte that is transmitted within the IoT network may come under scrutiny at some layer. This chapter identifies universal layers within the IoT architecture and discussed security vulnerability in all layers.

[1]  Jiafu Wan,et al.  Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[2]  Yacine Challal,et al.  A roadmap for security challenges in the Internet of Things , 2017, Digit. Commun. Networks.

[3]  Prasad Calyam,et al.  Flexible IoT security middleware for end-to-end cloud-fog communication , 2018, Future Gener. Comput. Syst..

[4]  Adam A. Bahishti Humanoid Robots and Human Society , 2017 .

[5]  Rahim Rahmani,et al.  Towards Security on Internet of Things: Applications and Challenges in Technology , 2018, EUSPN/ICTH.

[6]  Murad Khan,et al.  Internet of Things: A Comprehensive Review of Enabling Technologies, Architecture, and Challenges , 2018 .

[7]  Nelson Luis Saldanha da Fonseca,et al.  The Internet of Things, Fog and Cloud Continuum: Integration and Challenges , 2018, Internet Things.

[8]  Athanasios V. Vasilakos,et al.  Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.

[9]  Smruti R. Sarangi,et al.  Internet of Things: Architectures, Protocols, and Applications , 2017, J. Electr. Comput. Eng..

[10]  Marie Pelleau,et al.  1 – State of the Art , 2015 .

[11]  Lan Li Study on security architecture in the Internet of Things , 2012 .

[12]  Nirwan Ansari,et al.  Dynamic Resource Caching in the IoT Application Layer for Smart Cities , 2018, IEEE Internet of Things Journal.

[13]  Muhammad Waseem,et al.  A Critical Analysis on the Security Concerns of Internet of Things (IoT) , 2015 .

[14]  Jing Chen,et al.  Towards decentralized IoT security enhancement: A blockchain approach , 2018, Comput. Electr. Eng..

[15]  Kostas E. Psannis,et al.  Secure integration of IoT and Cloud Computing , 2018, Future Gener. Comput. Syst..

[16]  Yasir Mehmood,et al.  Enabling Communication Technologies for Smart Cities , 2017, IEEE Communications Magazine.

[17]  Hüseyin Yildirim,et al.  A model for predicting user intention to use wearable IoT devices at the workplace , 2019, J. King Saud Univ. Comput. Inf. Sci..

[18]  Alaa Hassan Lightweight Cryptography for the Internet of Things , 2021 .

[19]  Tariq Aziz,et al.  Security Challenges Facing IoT Layers and its Protective Measures , 2018 .

[20]  Alessandro Neri,et al.  A federated architecture approach for Internet of Things security , 2014, 2014 Euro Med Telco Conference (EMTC).

[21]  Sung-Ju Lee,et al.  Intelligent positive computing with mobile, wearable, and IoT devices: Literature review and research directions , 2019, Ad Hoc Networks.

[22]  Phil Beecher Enterprise-grade networks: the answer to IoT security challenges , 2018, Netw. Secur..

[23]  Ahmad Almogren,et al.  Workload aware VM consolidation method in edge/cloud computing for IoT applications , 2019, J. Parallel Distributed Comput..

[24]  Yuan Tian,et al.  Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home , 2018, ArXiv.

[25]  Imran A. Zualkernan,et al.  Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).

[26]  Yi Zhang,et al.  Internet-of-Things Security and Vulnerabilities: Taxonomy, Challenges, and Practice , 2018, J. Hardw. Syst. Secur..

[27]  Choong Seon Hong,et al.  Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges , 2019, Future Gener. Comput. Syst..

[28]  Ibrahim Korpeoglu,et al.  Fog-Based Data Distribution Service (F-DAD) for Internet of Things (IoT) applications , 2019, Future Gener. Comput. Syst..

[29]  D KavyashreeE 6LoWPAN NETWORK USING CONTIKI OPERATING SYSTEM , 2018 .

[30]  Changiz Valmohammadi Examining the perception of Iranian organizations on Internet of Things solutions and applications , 2016 .

[31]  Mazliza Othman,et al.  Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..

[32]  Giancarlo Fortino,et al.  Autonomic computation offloading in mobile edge for IoT applications , 2019, Future Gener. Comput. Syst..