Abstract

Current IP and other networks such as Power Smart Grids are fast evolving thus resulting in diverse connectivity methodologies. This has led to the emergence of “the Internet of Things (IoT) methodology whose goal is to transform the current IP and related networks to Machine-to-Machine (M-2-M) basis. It will seamlessly interconnect the globe and cyberspace via physical objects that embed with intelligent sensors of varying types, this resulting in voluminous generation and exchange of data by an excess of 20 billion Internet-connected objects and sensors (things) by 2020 [1]. The resultant structure will benefit mankind by helping us make tough decisions as well as be provisioned of beneficial services. In this paper, we overview both IoT architecture as well as security for IoT associated objects and devices. We will commence with a description of a generalized IoT and security architecture as well as how the various elements constituting them interact. We describe an approach that allows the protection of both constrained and unconstrained IoT devices through robust encryption as well as authentication, so that both can equally leverage from the same security framework, but still maintaining low computational loads, by avoiding excessive computational operations.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call