A security framework for IOT devices against wireless threats

Everyday number of smart devices or IOT devices either it be a smart phone, tablet, smart home device or any wearable technology are being connected to the internet. These IOT devices have become an essential part of our everyday life. We use them in many forms without being aware that we have started depending on them like for security purpose we use security systems in our house, or the smarts locks on our doors to keep our self-safe from the moon lighters. But do we really consider our security that seriously. Today IOT device security has become one of the major concern of the IT Industry. In this paper, we are using the block chain technique to develop a framework for security and management of data on the internet. We have developed a framework which shows how smart devices communicate with each other with block chain posing as the backbone. The framework serves as a scalable and robust solution, in order to address identity and security concerns of IOT. The proposed framework is further compared to existing models.

[1]  Ramjee Prasad,et al.  Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT) , 2010, CNSA.

[2]  Michael Devetsikiotis,et al.  Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.

[3]  Athanasios V. Vasilakos,et al.  Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.

[4]  Himanshu Gupta,et al.  ROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTION , 2011 .

[5]  Md Husamuddin,et al.  Internet of Things: A study on security and privacy threats , 2017, 2017 2nd International Conference on Anti-Cyber Crimes (ICACC).

[6]  Rodrigo Roman,et al.  On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.

[7]  Ilaria Torre,et al.  A framework for personal data protection in the IoT , 2016, 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST).

[8]  Niraj K. Jha,et al.  A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.

[9]  Vinod Kumar Sharma,et al.  Multiphase Encryption: A New Concept in Modern Cryptography , 2013 .

[10]  Choong Seon Hong,et al.  Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.

[11]  Levente Buttyán,et al.  Embedded systems security: Threats, vulnerabilities, and attack taxonomy , 2015, 2015 13th Annual Conference on Privacy, Security and Trust (PST).

[12]  Himanshu Gupta,et al.  Automated Verification in Cryptography System , 2016, ICTCS '16.

[13]  Himanshu Gupta,et al.  A New Approach for the Security of VPN , 2016, ICTCS.

[14]  Cristina Alcaraz,et al.  Wireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration? , 2010, IWSEC 2010.

[15]  Zhihua Li,et al.  A Multi-layer Security Model for Internet of Things , 2012 .

[16]  Sunil Kumar,et al.  Agent based Security Model for Cloud Big Data , 2016, ICTCS '16.

[17]  Rosli Salleh,et al.  Security Overview of Wireless Sensor Network , 2013 .

[18]  Mazin S. Al-Hakeem,et al.  Implementation of Common Secure Framework for IoT based Arduino Platform , 2016 .