We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Literature Survey on IoT Security Challenges

by Shubhalika Dihulia, Tanveer Farooqui
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 169 - Number 4
Year of Publication: 2017
Authors: Shubhalika Dihulia, Tanveer Farooqui
10.5120/ijca2017914616

Shubhalika Dihulia, Tanveer Farooqui . A Literature Survey on IoT Security Challenges. International Journal of Computer Applications. 169, 4 ( Jul 2017), 10-14. DOI=10.5120/ijca2017914616

@article{ 10.5120/ijca2017914616,
author = { Shubhalika Dihulia, Tanveer Farooqui },
title = { A Literature Survey on IoT Security Challenges },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2017 },
volume = { 169 },
number = { 4 },
month = { Jul },
year = { 2017 },
issn = { 0975-8887 },
pages = { 10-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume169/number4/27972-2017914616/ },
doi = { 10.5120/ijca2017914616 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:16:27.179636+05:30
%A Shubhalika Dihulia
%A Tanveer Farooqui
%T A Literature Survey on IoT Security Challenges
%J International Journal of Computer Applications
%@ 0975-8887
%V 169
%N 4
%P 10-14
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This survey paper discuss the security challenges in IoT network. IoT is hot research topic in between researchers. In the era of digital media IoT play an important role of information servers and data warehouses. IoT network are used in different cities of smart city network. That’s why the security of the IoT network is also a big task. There are many loop holes available in IoT based security network. In this survey paper discuss the security aspects in the IoT networks. Also discuss the different researches previous work and previous work in IoT security. This survey analyzes existing protocols and mechanisms to secure communications in the IoT, as well as open research issues. We analyze how existing approaches ensure fundamental security requirements and protect communications on the IoT, together with the open challenges and strategies for future research work in the area. This is, as far as our knowledge goes, the first survey with such goals.

References
  1. Bowman, Lianos, M. and Douglas, M. (2000) Dangerization and the End of Deviance: The Institutional Environment. British Journal of Criminology, 40, 261-278.
  2. Ferguson, T. (2002) Have Your Objects Call My Object. Harvard Business Review, June, 1-7.
  3. Nunberg, G. (2012) The Advent of the Internet: 12th April, Courses.
  4. Kosmatos, E.A., Tselikas, N.D. and Boucouvalas, A.C. (2011) Integrating RFIDs and Smart Objects into a Unified Internet of Things Architecture. Advances in Internet of Things: Scientific Research, 1, 5-12.
  5. Aggarwal, R. and Lal Das, M. (2012) RFID Security in the Context of “Internet of Things”. First International Conference on Security of Internet of Things, Kerala, 17-19 August 2012, 51-56.
  6. Biddlecombe, E. (2009) UN Predicts “Internet of Things”. Retrieved July 6.
  7. Butler, D. (2020) Computing: Everything, Everywhere. Nature, 440, 402-405.
  8. Dodson, S. (2008) The Net shapes up to Get Physical. Guardian.
  9. Gershenfeld, N., Krikorian, R. and Cohen, D. (2004) the Internet of Things. Scientific American, 291, 76-81.
  10. Lombreglia, R. (2010) the Internet of Things, Boston Globe. Retrieved October.
  11. Reinhardt, A. (2004) A Machine-to-Machine Internet of Things.
  12. Graham, M. and Haarstad, H. (2011) Transparency and Development: Ethical Consumption through Web 2.0 and the Internet of Things. Research Article, 7.
  13. Jayavardhana, G., Rajkumar, B., Marusic, S. and Palaniswami, M. (2013) Internet of Things: A Vision, Architectural Elements, and Future Directions. Future Generation.
  14. Gigli, M. and Koo, S. (2011) Internet of Things, Services and Applications Categorization. Advances in Internet of Things, 1, 27-31. http://dx.doi.org/10.4236/ait.2011.12004
  15. (2005) ITU Internet Reports, International Telecommunication Union. The Internet of Things: 7th Edition. www.itu.int/internetofthings/on
  16. Want, R. (2006) An Introduction to RFID Technology. IEEE Pervasive Computing, 5, 25-33.
  17. Li, B.A. and Yu, J.J. (2011) Research and Application on the Smart Home Based on Component Technologies and Internet of Things. Procedia Engineering, 15, 2087-2092. http://dx.doi.org/10.1016/j.proeng.2011.08.390
  18. Razzak, F. (2012) Spamming the Internet of Things: A Possibility and its probable Solution. Procedia Computer Science, 10, 658-665. http://dx.doi.org/10.1016/j.procs.2012.06.084
  19. Shao, W. and Li, L. (2009) Analysis of the Development Route of IoT in China. Perking: China Science and Technology Information, 24, 330-331.
  20. Sun, C. (2012) Application of RFID Technology for Logistics on Internet of Things.
  21. Moeinfar, D., Shamsi, H. and Nafar, F. (2012) Design and Implementation of a Low-Power Active RFID for Container Tracking @ 2.4 GHz Frequency: Scientific Research.
  22. Bicknell, IPv6 Internet Broken, Verizon Route Prefix Length Policy, 2009.
  23. Grieco A., Occhipinti, E. and Colombini, D. (1989) Work Postures and Musculo-Skeletal Disorder in VDT Operators. Bollettino de Oculistica, Suppl. 7, 99-111.
  24. Pahlavan, K., Krishnamurthy, P., Hatami, A., Ylianttila, M., Makela, J.P., Pichna, R. and Vallstron, J. (2007) Handoff in Hybrid Mobile Data Networks. Mobile and Wireless Communication Summit, 7, 43-47.
  25. Chen, X.-Y. and Jin, Z.-G. (2012) Research on Key Technology and Applications for the Internet of Things. Physics Procedia, 33,561-566. http://dx.doi.org/10.1016/j.phpro.2012.05.104
  26. Arampatzis, T., et al. (2005) A Survey of Security Issues in Wireless Sensors Networks, in Intelligent Control. Proceeding of the IEEE International Symposium on, Mediterrean Conference on Control and Automation, 719-724.
  27. Chorost, M. (2008) The Networked Pill, MIT Technology Review, March.
Index Terms

Computer Science
Information Sciences

Keywords

End-to-end security IEEE 802.15.4 Internet of things RPL Security MAC layer IP V6 and V4