Abstract

A lot of communication are developed and advanced with different and heterogeneous communication techniques by integration of wireless and wire connection. Conventional technology is mainly focus on information technology based on computer techniques in the field of industry, manufacture and automation fields. It consists of individual skill and technique. As new technologies are developed and enhanced with conventional techniques, a lot of new application is emerged and merged with previous mechanism and skills. The representative application is internet of things services and applications. Internet of things is breakthrough technologies and one of the innovation industries which are called 4 generation industry revolution. Many different types of object and devices are embedded in sensor node. They are inter-connected with optimized open system interconnection protocol over internet, wireless and wire medium. Most of communication is fully inter-connected with conventional techniques at point to point and end to application in general. Most of information in internet of things is weak against attack. This may induce vulnerable features to unauthorized and outside attacker over internet protocol, Bluetooth, Wi-Fi, and so forth. As high and low efficient equipment are merged into heterogeneous infrastructure, IoT communication surroundings has become more complex, Due to limited resources in IoT such as small memory, low power and computing power, IoT devices are vulnerable and disclosed with security problems. In this chapter, we analyzed security challenges and threats based on smart home network under IoT service.

Highlights

  • IoT (The Internet of Things) is widespread, ubiquitous and becoming realized in the real world

  • IoT is used for connecting devices and sensors with small and limited resources devices to detect a lot of different devices

  • Internet of Things is used in many applications in different areas. loT has been already designed for industrial wireless sensor network in many applications

Read more

Summary

Introduction

IoT (The Internet of Things) is widespread, ubiquitous and becoming realized in the real world. The Internet of things, its devices and objects are regarded as a global network infrastructure by linking physical and virtual objects It is implemented by the merging of data capture and communication capabilities in sensor node. IoT is used for connecting devices and sensors with small and limited resources devices to detect a lot of different devices. Most of papers are focus on in the field of efficient and reliable mechanism of security engines It includes many applications such as sensing, privacy, tracking, services, data modeling and protocols. Cryptography mechanisms and security protocols should be optimized to adapt constrained devices and objects or new design method to be applicable and integrating into related IoT system.

Related works
Authorization
Basic concept of IoT
Application Layer
Application of IoT services
Security and privacy issues
Model of attacks and threats based on IoT devices
Data deluge
Miniaturization of devices
IPv6 as an integration layer
Standards
Open security issues for smart home network
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call