Abstract

Internet of things (IoT) is realized by the idea of free flow of information amongst various low-power embedded devices that use the Internet to communicate with one another. It is predicted that the IoT will be widely deployed and will find applicability in various domains of life. Demands of IoT have lately attracted huge attention, and organizations are excited about the business value of the data that will be generated by deploying such networks. On the contrary, IoT has various security and privacy concerns for the end users that limit its proliferation. In this paper, we have identified, categorized, and discussed various security challenges and state-of-the-art efforts to resolve these challenges.

Highlights

  • E authors in [16] have presented security architecture for IP-enabled Internet of things (IoT) based on Host Identity Protocol (HIP) and DTLS (Datagram Transport Layer Security) adapted to resource-constrained devices

  • People have approached the problem of ensuring robustness in IoT network by proposing protocols and network management framework

  • We have categorized and discussed the state-of-the-art work done in ensuring security in the IoT network

Read more

Summary

Privacy in IoT

A detailed discussion on security threats and privacy in IoT architectures can be found in [6]. E authors in [14] proposed a detailed analysis of threats related to privacy challenges in the IoT. Unauthorized collection of information about the existence and characteristics of personal things is called inventory attack Another privacy threat is associated with combining and aggregating data from different data sources which often happen in IoT application. E authors in [16] have presented security architecture for IP-enabled IoT based on HIP (host identity protocol) and DTLS (Datagram Transport Layer Security) adapted to resource-constrained devices. E authors presented and discussed essential research challenges and prevailing solutions in IoT security, distinguishing open issues and proposing future directions for research. Initial architecture in this direction can be found in [29]

Lightweight Cryptographic Framework for IoT
Secure Routing and Forwarding in IoT
Robustness and Resilience Management in IoT
Denial of Service and Insider Attack Detection in IoT
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call