Abstract

The Internet of Things (IoT) is viewed as a dynamic technological revolution representing future communications and computing in several areas. It introduces physical objects in the sphere of cyber world. IoT is not about a single technology but various complementary technological developments which provides ways to bridge the gap between the real world and the virtual world. A number of wireless sensor technologies are implemented in IoT viz. RFID, ZigBee, actuators, WiFi and wireless sensor networks (WSNs). This paper presents various key technologies involved in IoT and its detailed architecture. IoT architecture explains function of each layer with respect to the technologies and the devices that surround each layer. Each layer has its specific security issues. This paper presents various security threats related to each IoT layer and the specific security requirements. Information security, data protection, and user's privacy are among important key areas in IoT. This paper in the nutshell presents new challenges posed by IoT so that further work can be undertaken in creating a robust, efficient and smart environment for IoT based applications.

Highlights

  • In the present digital world Internet of Things (IoT) is considered as a buzzword which is coined from two words, “Internet” and “Things”

  • A number of wireless sensor technologies are implemented in IoT viz. Radio frequency identification (RFID), ZigBee, actuators, WiFi and wireless sensor networks (WSNs)

  • This paper presents various key technologies involved in IoT and its detailed architecture

Read more

Summary

Introduction

In the present digital world IoT is considered as a buzzword which is coined from two words, “Internet” and “Things”. Various tagging technologies including NFC, RFID, and 2D barcode are used to identify physical objects over the internet These wireless tagging technologies are the key technologies in IoT. Authors in [1] discussed different ways of spamming the IoT and proposed a possible solution to prevent from spamming. Web spammers using 2D barcode technology can flood the physical side of IoT They can get unsolicited content over the Internet either to change the contents or for misusing the information. Smart health is an area of IoT which requires continuous finegrained information from sensors attached to patients In such applications, a human body is providing a rich source of information like location, time, behavior, personal habits, and preferences of individuals. Various security issues related to IoT architecture and their effect on different layers are presented.

IoT key technologies
Barcode
ZigBee
Actuators
IoT architecture
Perception layer
Network availability
Jamming
Eavesdropping
Replay attack
Blocking
Tag cloning
3.1.12. Information leakage
Sybil attack
Wormhole
Hello-flood attack
Acknowledgement flooding
Support layer
Unauthorized access
Application layer
Session hijacking
Social engineering
Threats analysis
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.