CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

A Critical Analysis on the Security Concerns of Internet of Things (IoT)

by M.u. Farooq, Muhammad Waseem, Anjum Khairi, Sadia Mazhar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 111 - Number 7
Year of Publication: 2015
Authors: M.u. Farooq, Muhammad Waseem, Anjum Khairi, Sadia Mazhar
10.5120/19547-1280

M.u. Farooq, Muhammad Waseem, Anjum Khairi, Sadia Mazhar . A Critical Analysis on the Security Concerns of Internet of Things (IoT). International Journal of Computer Applications. 111, 7 ( February 2015), 1-6. DOI=10.5120/19547-1280

@article{ 10.5120/19547-1280,
author = { M.u. Farooq, Muhammad Waseem, Anjum Khairi, Sadia Mazhar },
title = { A Critical Analysis on the Security Concerns of Internet of Things (IoT) },
journal = { International Journal of Computer Applications },
issue_date = { February 2015 },
volume = { 111 },
number = { 7 },
month = { February },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume111/number7/19547-1280/ },
doi = { 10.5120/19547-1280 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:48:13.100074+05:30
%A M.u. Farooq
%A Muhammad Waseem
%A Anjum Khairi
%A Sadia Mazhar
%T A Critical Analysis on the Security Concerns of Internet of Things (IoT)
%J International Journal of Computer Applications
%@ 0975-8887
%V 111
%N 7
%P 1-6
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Internet of Things (IoT) has been a major research topic for almost a decade now, where physical objects would be interconnected as a result of convergence of various existing technologies. IoT is rapidly developing; however there are uncertainties about its security and privacy which could affect its sustainable development. This paper analyzes the security issues and challenges and provides a well defined security architecture as a confidentiality of the user's privacy and security which could result in its wider adoption by masses.

References
  1. Kevin Ashton, That Internet of things thing, It can be accessed at: http://www. rfidjournal. com/articles/view?4986
  2. D. Singh, G. Tripathi, A. J. Jara, A survey of Internet-of Things: Future Vision, Architecture, Challenges and Services, in Internet of Things (WF-IoT), 2014
  3. Gartner, Inc. It can be accessed at: http://www. gartner. com/newsroom/id/2905717
  4. Rolf H. Weber, "Internet of Things - New security and privacy challenges," in Computer Law and Security Review (CLSR), 2010, pp. 23-30
  5. Rodrigo Roman, Pablo Najera and Javier Lopez, "Securing the Internet of Things," in IEEE Computer, Volume 44, Number 9, 2011, pp. 51-58
  6. Friedemann Mattern and Christian Floerkemeier, "From the Internet of Computers to the Internet of Things," in Lecture Notes In Computer Science (LNCS), Volume 6462, 2010, pp 242-259
  7. Hui Suo, Jiafu Wan, Caifeng Zou, Jianqi Liu, Security in the Internet of Things: A Review, in Computer Science and Electronics Engineering (ICCSEE), 2012, pp. 648-651
  8. Ying Zhang, Technology Framework of the Internet of Things and Its Application, in Electrical and Control Engineering (ICECE), pp. 4109-4112
  9. Xue Yang, Zhihua Li, Zhenmin Geng, Haitao Zhang, A Multilayer Security Model for Internet of Things, in Communications in Computer and Information Science, 2012, Volume 312, pp 388-393
  10. Rafiullah Khan, Sarmad Ullah Khan, R. Zaheer, S. Khan, Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges, in 10th International Conference on Frontiers of Information Technology (FIT 2012), 2012, pp. 257-260
  11. Shi Yan-rong, Hou Tao, Internet of Things key technologies and architectures research in information processing in Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE), 2013
  12. Daniele Miorandi, Sabrina Sicari, Francesco De Pellegrini and Imrich Chlamtac, "Internet of Things: Vision, applications and research challenges," in Ad Hoc Networks, 2012, pp. 1497-1516
  13. Luigi Atzori, Antonio Iera, Giacomo Morabito, "The Internet of Things: A Survey," in Computer Networks, pp. 2787-2805
  14. Mr. Ravi Uttarkar and Prof. Raj Kulkarni, "Internet of Things: Architecture and Security," in International Journal of Computer Application, Volume 3, Issue 4, 2014
  15. Mike Burmester and Breno de Medeiros, "RFID Security: Attacks, Countermeasures and Challenges. "
  16. Benjamin Khoo, "RFID as an Enabler of the Internet of Things: Issues of Security and Privacy," in IEEE International Conferences on Internet of Things, and Cyber, Physical and Social Computing, 2011
  17. Aikaterini Mitrokotsa, Melanie R. Rieback and Andrew S. Tanenbaum, "Classification of RFID Attacks. "
  18. Lan Li, "Study on Security Architecture in the Internet of Things," in International Conference on Measurement, Information and Control (MIC), 2012
  19. John R. Douceur, "The Sybil Attack," in Peer-to-Peer Systems - IPTPS, 2002, pp. 251-260
  20. Nadeem AHmed, Salil S. Kanhere and Sanjay Jha, "The Holes Problem in Wireless Sensor Network: A Survey," in Mobile Computing and Communications Review, Volume 1, Number 2
  21. Tapalina Bhattasali, Rituparna Chaki and Sugata Sanyal, "Sleep Deprivation Attack Detection in Wireless Sensor Network," in International Journal of Computer Applications, Volume 40, Number 15, 2012
  22. Dr. G. Padmavathi, Mrs. D. Shanmugapriya, "A survey of ATtacks, Security Mechanisms and Challenges in Wireless Sensor Networks," in International Journal of Computer Science and Information Security, Volume 4, Number 1, 2009
  23. Priyanka S. Fulare and Nikita Chavhan, "False Data Detection in Wireless Sensor Network with Secure Communication," in International Journal of Smart Sensors and AdHoc Networks (IJSSAN), Volume-1, Issue-1, 2011
  24. Rabi Prasad Padhy, Manas Ranjan Patra, Suresh Chandra Satapathy, "Cloud Computing: Security Issues and Research Challenges," in International Journal of Computer Science and Information Technology & Security (IJCSITS).
  25. Bhupendra Singh Thakur, Sapna Chaudhary, "Content Sniffing Attack Detection in Client and Server Side: A Survey," in International Journal of Advanced Computer Research, Volume 3, Number 2, 2013
  26. W. Zhang, B. Qu, Security Architecture of the Internet of Things Oriented to Perceptual Layer, in International Journal on Computer, Consumer and Control (IJ3C), Volume 2, No. 2 (2013)
  27. K. E. Emam, F. K. Dankar, Protecting Privacy Using kAnonymity, in Journal of the American Medical Informatics Association, Volume 15, Number 5, 2008
  28. C. Liu, Y. Zhang, J. Zeng, L. Peng, R. Chen, Research on Dynamical Security Risk Assessment for the Internet of Things inspired by immunology, in Eighth International Conference on Natural Computation (ICNC), 2012
  29. T. Karygiannis, B. Eydt, G. Barber, L. Bunn, T. Phillips, Guidelines for Securing Radio Frequency Identification (RFID) Systems, in Recommendations of National Institute of Standards and Technology
  30. Yassine MALEH and Abdellah Ezzati, "A Review of security attacks and Intrusion Detection Schemes inWireless Sensor Networks," in International Journal of Wireless & Mobile Networks (IJWMN), Volume 5, Number 6, 2013
  31. Z. Xu, Y. Yin, J. Wang, A Density-based Energy-efficient Clustering Algorithm forWireless Sensor Networks, in International Journal of Future Generation Communication and Networking, Volume 6, Number 1, 2013
  32. Shashank Agrawal and Dario Vieira, A survey on Internet of Things.
  33. Chen Qiang, Guang-ri Quan, Bai Yu and Liu Yang, Research on Security Issues of the Internet of Things, in International Journal of Future Generation Communication and Networking, Volume 6, Number 6, 2013, pp. 1-10
  34. Animesh Patcha, Jung-Min Park, An overview of anomaly detection techniques: Existing solutions and latest technological trends, in Computer Networks, Volume 51, Issue 2, 2007
  35. Jayavardhana Gubbi, Rajkumar Buyya, Slaven Marusic and Marimuthu Palaniswami, "Internet of Things (IoT): A vision, architectural elements, and future directions. "
Index Terms

Computer Science
Information Sciences

Keywords

Internet of Things IoT IoT security goals IoT security challenges and issues IoT security architecture.