Abstract

The Internet of Things (IoT), is a network of devices that are uniquely identified and has embedded software required to communicate the transient states and data that are usually used to trigger an actuator. The edge networking devices and protocols are used to communicate with a cloud server that processes and aggregates the big data arriving from various devices, performs analytics and aids in business decisions. IoT has become an integral part of today’s industrial, agriculture, healthcare and smart city revolution. Securing all entities involved in an IoT network is vital as it involves pervasive data collection and dissemination. Current IoT protocols work with IP protocols as backbone, but they are specially designed to operate in multiple layers and provide security at various layers. This chapter focuses on IoT protocols that deals with securing an IoT network. The major challenges in securing an IoT network is lack of standardization at manufacturing level which exposes the hardware, software and the data to various threats and attacks. The IoT protocols have to deal with security breaches at the site of the cloud service provider and the security issues pertaining to data privacy, authentication, authorization and trust management in a distributed heterogeneous environment. This chapter also elaborates on various security attacks and the solutions offered by IoT protocols.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.