A Review on Security Issues and Challenges of IoT

  • Authors

    • Dr E. Suresh Babu
    • V Bhargav Raj
    • M Manogna Devi
    • K Kirthana
    2018-05-31
    https://doi.org/10.14419/ijet.v7i2.32.15708
  • Security issues in IoT, challenges in IoT, Review on IoT.
  • This papers reviews and surveys the security issues, mechanism of internet of things (IoT) proposed in the literature. As IoT is a computing concept that describes the idea of everyday physical objects being connected to the internet and being able to identify themselves to other devices. The main advantages of IoT improve the resource utilization ratio and relationship between human and nature. In addition, it possesses various characteristics like sensing, heterogeneity, connectivity, dynamic nature and intelligence. However, it possesses several challenges like connectivity, compatibility, longevity, privacy and security. Specifically, Security and privacy are the crucial issues that need to be solved for successful deployment of IoT. Moreover, some of the data collected from the IoT are very sensitive and should not be revealed to third parties. Such data needs to be protected by some provided legislations. We reviewed some of the security challenges of IoT like secure communication, data privacy and integrity, authorizing and authenticating the devices.

     

     

  • References

    1. [1] Zhicai Shi, Jiwei Chen, Shanshan Chen, “A lightweight RFID authentication protocol with confidentiality and anonymityâ€, IEEE 2nd Advanced Information Technology, Electronic and Automa-tion Control Conference (IAEAC), 2017

      [2] Chih-Hsueh Lin, Wen-Shyong Hsieh, Fu Mo, Ming-Hao Chang, “A PTC Scheme for Internet of Things: Private-Trust-Confidentialityâ€, 30th International Conference, Advanced Infor-mation Networking and Applications Workshops (WAINA), 2016

      [3] Christos Chatzigeorgiou, Lazaros Toumanidis, Dimitris Kogias, Charalampos Patrikakis, Eric Jacksch, “A Communication Gateway Architecture for Ensuring Privacy and Confidentiality in Incident Reportingâ€, IEEE 15th International Conference, Software Engi-neering Research, Management and Applications (SERA), 2017

      [4] Johannes Braun and Johannes Buchmann, “Perfect Confidenti-ality Networkâ€, 5th International Conference, New Technologies, Mobility and Security (NTMS), 2012

      [5] Park Ji-yong, Mi-sun Ryu, Jung Eui suk, “An integrated securi-ty mechanism for network coding combining confidentiality and integrityâ€, 11th International Conference, Advanced Communication Technology, 2009. ICACT 2009

      [6] Yuchen Yang, Longfei Wu, Guisheng Yin, Lijie Li_, and Hongbin Zhao, “A Survey on Security and Privacy Issues in Inter-net-of-Thingsâ€, IEEE Internet of Things Journal ( Volume: 4, Issue: 5, Oct. 2017 )

      [7] Sofia Zebboudj, Rabah Brahami, Chahinas Mouzaia, Celia Ab-bas, Nabil Boussaid and Mawloud Omar, “Big Data Source Loca-tion Privacy and Access Control in the Framework of IoTâ€, 5th International Confer-ence, Electrical Engineering - Boumerdes (ICEE-B), 2017

      [8] Ana Nieto, Ruben Rios and Javier Lopez, “Digital Witness and Privacy in IoT: Anonymous Witnessing Approachâ€, IEEE Trust-com/BigDataSE/ICESS

      [9] Mohamed Abomhara and Geir M. Koien, “Security and Privacy in the Internet of Things: Current Status and Open Issuesâ€, Interna-tional Conference, Privacy and Security in Mobile Systems (PRISMS), 2014

      [10] Zhen Ling, Kaizheng Liu, Yiling Xu, Yier Jin, Xinwen Fu, “An End-to-End View of IoT Security and Privacyâ€, http://jin.ece.ufl.edu/papers/GlobeCom17-CR.pdf

      [11] Anders Fongen, “Identity Management and Integrity Protec-tion in the Internet of Things“, Third International Confer-ence Emerging Security Technologies (EST), 2012

      [12] Henrich C. Pohls, “JSON Sensor Signatures (JSS): End-to-End Integrity Protection from Constrained Device to IoT Applica-tionâ€, 9th International Conference, Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2015

      [13] Alireza Esfahani, Georgios Mantas, Rainer Matischek, Firooz B. Saghezchi, Jonathan Rodriguez, Ani Bicaku, Silia Maksuti, Markus Tauber, Christoph Schmittner, and Joaquim Bastos, “A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environmentâ€, IEEE Internet of Things Jour-nal ( Volume: PP, Issue: 99 )

      [14] Bacem Mbarek, Aref Meddebz, Wafa Ben Jaballahy, Mo-hamed Mosbah, “A Secure Authentication Mechanism for Re-source Constrained Devicesâ€, IEEE/ACS 12th International Conference, Computer Systems and Applications (AICCSA), 2015

      [15] Shamini Emerson, Young-Kyu Choi, Dong Yeop Hwang, “An OAuth based authentication mechanism for IoT networksâ€, International Conference, Information and Communication Tech-nology Convergence (ICTC), 2015

      [16] Padraig Flood, Michael Schukat, “Peer to peer authentication for small embedded systems: A zero-knowledge-based approach to security for the Internet of Thingsâ€, 10th International Confer-ence, Digital Technologies (DT), 2014.

  • Downloads

  • How to Cite

    E. Suresh Babu, D., Bhargav Raj, V., Manogna Devi, M., & Kirthana, K. (2018). A Review on Security Issues and Challenges of IoT. International Journal of Engineering & Technology, 7(2.32), 341-344. https://doi.org/10.14419/ijet.v7i2.32.15708