Abstract

As Internet of Things (IoT) applications have taken the center stage of the technology development recently, the security issues and concerns arise naturally and significantly due to IoT connection to the anonymous and untrusted internet. Although the security protocols and technology for the internet applications have been studied for decades, the ubiquity and heterogeneity of IoT applications present unique challenges in handling security issues and problems. In addition to developing new protocols or to upgrade the existing protocols, some research has been done in experimenting security approaches for IoT applications. Since the results of the current research are mainly based on either the related protocols or the applicable approaches, the results of the discussion is often limited to a particular environment or a specific situation. In this paper, based on a thorough study on the existing research accomplishment and published experiment results, an integrated framework is proposed for evaluating the security solutions for IP-based IoT applications with the considerations in hardware constraints, operational constraints and network scenarios. The results of the study shows the potentials in drawing a balanced view in evaluating the security solutions to IP-based IoT applications and laying a step-stone for the further standardization of related IoT protocols and approaches for the security issues.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call