Abstract

Web of things (WoT) is an improved and most promising infrastructure of the internet of things (IoT) which permits the smart things to not only integrate to the internet but also to the web. It allows the users to share and create content as well as provide capabilities for data aggregation and analysis through a network to become part of the World Wide Web (W3). Despite these advances, it has shown several security challenges that need to be addressed for the successful deployment of WoT on a commercially variable and large scale. In this paper, authors have analyzed the most noticeable security challenges related to WoT such as unauthorized access, eavesdropping, denial of service attack, tempering, and impersonating, through an analysis of already published empirical studies. Further, we have discussed some of the available mechanisms to overcome security related issues while taking into account the network size and mobility. Authors have used Threat analysis and attack modeling methods to inform the users about defensive measures and to prevent security threats from taking advantage of system flaws Authors have provided the necessary insight into how security can be improved by using certain existing mechanisms and algorithms. The findings of the study revealed that security mechanisms to secure WoT are still immature and future research is required to resolve these challenges.

Highlights

  • In this modern era, the internet is connecting more and more things to the global network and in this network, the web provides a universal platform for sharing resources, archiving and publishing services, etc

  • Web of things (WoT) is supported by internet of things (IoT) at the network layer which is meant to provide any device like phones, laptops, The associate editor coordinating the review of this manuscript and approving it for publication was Qing Yang

  • This paper is considerably different from our previous study [17] in the following aspects: (1) Authors in [17] focused on finding the dynamic searching problem of the WoT while we are concerned about finding the security challenges in the domain of the WoT; (2) we are identifying the existing security mechanisms to establish secure WoT while authors in [17] investigated the current trends and research gaps of the WoT; (3) The focus of the authors in [17] is on the find layer while in this paper, we focused on the share layer as it is responsible for the sharing of data in a secure way

Read more

Summary

Introduction

The internet is connecting more and more things to the global network and in this network, the web provides a universal platform for sharing resources, archiving and publishing services, etc. In WoT ‘‘things’’ refers to the physical or abstract objects and ‘‘web’’ refers to these objects that are accessible via web services, such as HTTP and API’s scripting can be used at protocol and service layers respectively for embedding complex and smart real-life realities with it [1]. WoT is expected to make accessibility of smart things easy and promote by combining novel values of web resources to physical world entities (sensors, appliances, and smart objects). The relationship between WoT and IoT is just the same as the relationship between the web and the internet. WoT is supported by IoT at the network layer which is meant to provide any device like phones, laptops, The associate editor coordinating the review of this manuscript and approving it for publication was Qing Yang

Objectives
Methods
Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.