Abstract

Internet of Things is the web of physical devices acquired through the Internet. These devices contain entrenched technology to connect with both internal environment or the external status. Internets of Things (IoT) devices are directly becoming ubiquitous while IoT services are becoming global. Cyber-intruders are not unique to IoT, but as it will be deeply merged in our lives and humankind, it is becoming essential to step up and take cyber protection seriously. With increasing use of it in diverse fields has improved the demands of various parameters, for an excessive degree of security and applications. In this paper, we have compared the variance in security features of new technology like Low-Power Wide Area (LPWA) network technologies: LoRaWAN and NB-IoT. The security features of every technology are specified in a comparison to demonstrate that security won't be the determining aspect while choosing on a LPWA technology. We describe the exceptional contributions that every characteristic makes the general security of a device and emphasize how the security functions may not or might be appropriate in our option of a LPWA technology, based on the designed use case. We consider whether the security functions of each technology are appropriate for a fixed of use cases representing standard deployments for every technology. Based on an assessment of an appropriate feature, we have calculated the performance of the security in each technology and the each use instances. After identifying the security problems in IoTs, this paper suggest answers from present technologies as a start line for establishing a standardized security paradigm in IoTs.

Highlights

  • The phrase Internet of Things (IOT) has acquired enormous fame with the eruption of wireless sensor networks, home automation devices, wearable electronics and smart meters

  • In when we review at all the technologies in terms of network investment, uplink and downlink traffic, coverage scenario and network reliability, so obviously we recognize that NB-IOT is the best appropriate technology

  • The most obvious choice is IP and, where it is used, it can be an enabler for implementation of well-tried and trusted standard security protocols, such as TLS, above the network layer; there is some potential downside as the use of IP may create an attack surface for Internet-borne threats such as botnets, if the device is usable from the social Internet

Read more

Summary

Introduction

The phrase Internet of Things (IOT) has acquired enormous fame with the eruption of wireless sensor networks, home automation devices, wearable electronics and smart meters. Selva Kumar: Improvement of Security in IOT Sensor Network to Overcome Harmful Intruder by Optimizing the Existing Techniques. Technologies under Consideration The illustrated idiosyncratic of a LPWA network is the network which supports devices even at low power in both conditions like transmission power and processing power periodically, there is an objective of a battery span of 10 years or greater. This is generally coupled with a goal of minimizing cost, in the recognize of the wireless module in the deep run devices. The time period NB-IoT encompasses the use of this generation in the LTE bands and includes use of the identical protocols in different, licensed radio spectrum outside the usual LTE bands

Related Works
Proposed Security Solutions of IoT
LoRaWAN
NB-IoT
Comparison in Terms of Security Features
Identity Protection
End-to-Middle Security
Replay Protection
Reliable Delivery
Network Monitoring and Filtering
Key Provisioning
IP Networ
Representative Use Cases
Smart Street Lighting
Water Metering
Security Suitability of LPWA Technologies
Findings
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.