Research Article

A Critical Analysis on the Security Concerns of Internet of Things (IoT)

by  M.U. Farooq, Muhammad Waseem, Anjum Khairi, Sadia Mazhar
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 111 - Issue 7
Published: February 2015
Authors: M.U. Farooq, Muhammad Waseem, Anjum Khairi, Sadia Mazhar
10.5120/19547-1280
PDF

M.U. Farooq, Muhammad Waseem, Anjum Khairi, Sadia Mazhar . A Critical Analysis on the Security Concerns of Internet of Things (IoT). International Journal of Computer Applications. 111, 7 (February 2015), 1-6. DOI=10.5120/19547-1280

                        @article{ 10.5120/19547-1280,
                        author  = { M.U. Farooq,Muhammad Waseem,Anjum Khairi,Sadia Mazhar },
                        title   = { A Critical Analysis on the Security Concerns of Internet of Things (IoT) },
                        journal = { International Journal of Computer Applications },
                        year    = { 2015 },
                        volume  = { 111 },
                        number  = { 7 },
                        pages   = { 1-6 },
                        doi     = { 10.5120/19547-1280 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2015
                        %A M.U. Farooq
                        %A Muhammad Waseem
                        %A Anjum Khairi
                        %A Sadia Mazhar
                        %T A Critical Analysis on the Security Concerns of Internet of Things (IoT)%T 
                        %J International Journal of Computer Applications
                        %V 111
                        %N 7
                        %P 1-6
                        %R 10.5120/19547-1280
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Internet of Things (IoT) has been a major research topic for almost a decade now, where physical objects would be interconnected as a result of convergence of various existing technologies. IoT is rapidly developing; however there are uncertainties about its security and privacy which could affect its sustainable development. This paper analyzes the security issues and challenges and provides a well defined security architecture as a confidentiality of the user's privacy and security which could result in its wider adoption by masses.

References
  • Kevin Ashton, That Internet of things thing, It can be accessed at: http://www. rfidjournal. com/articles/view?4986
  • D. Singh, G. Tripathi, A. J. Jara, A survey of Internet-of Things: Future Vision, Architecture, Challenges and Services, in Internet of Things (WF-IoT), 2014
  • Gartner, Inc. It can be accessed at: http://www. gartner. com/newsroom/id/2905717
  • Rolf H. Weber, "Internet of Things - New security and privacy challenges," in Computer Law and Security Review (CLSR), 2010, pp. 23-30
  • Rodrigo Roman, Pablo Najera and Javier Lopez, "Securing the Internet of Things," in IEEE Computer, Volume 44, Number 9, 2011, pp. 51-58
  • Friedemann Mattern and Christian Floerkemeier, "From the Internet of Computers to the Internet of Things," in Lecture Notes In Computer Science (LNCS), Volume 6462, 2010, pp 242-259
  • Hui Suo, Jiafu Wan, Caifeng Zou, Jianqi Liu, Security in the Internet of Things: A Review, in Computer Science and Electronics Engineering (ICCSEE), 2012, pp. 648-651
  • Ying Zhang, Technology Framework of the Internet of Things and Its Application, in Electrical and Control Engineering (ICECE), pp. 4109-4112
  • Xue Yang, Zhihua Li, Zhenmin Geng, Haitao Zhang, A Multilayer Security Model for Internet of Things, in Communications in Computer and Information Science, 2012, Volume 312, pp 388-393
  • Rafiullah Khan, Sarmad Ullah Khan, R. Zaheer, S. Khan, Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges, in 10th International Conference on Frontiers of Information Technology (FIT 2012), 2012, pp. 257-260
  • Shi Yan-rong, Hou Tao, Internet of Things key technologies and architectures research in information processing in Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE), 2013
  • Daniele Miorandi, Sabrina Sicari, Francesco De Pellegrini and Imrich Chlamtac, "Internet of Things: Vision, applications and research challenges," in Ad Hoc Networks, 2012, pp. 1497-1516
  • Luigi Atzori, Antonio Iera, Giacomo Morabito, "The Internet of Things: A Survey," in Computer Networks, pp. 2787-2805
  • Mr. Ravi Uttarkar and Prof. Raj Kulkarni, "Internet of Things: Architecture and Security," in International Journal of Computer Application, Volume 3, Issue 4, 2014
  • Mike Burmester and Breno de Medeiros, "RFID Security: Attacks, Countermeasures and Challenges. "
  • Benjamin Khoo, "RFID as an Enabler of the Internet of Things: Issues of Security and Privacy," in IEEE International Conferences on Internet of Things, and Cyber, Physical and Social Computing, 2011
  • Aikaterini Mitrokotsa, Melanie R. Rieback and Andrew S. Tanenbaum, "Classification of RFID Attacks. "
  • Lan Li, "Study on Security Architecture in the Internet of Things," in International Conference on Measurement, Information and Control (MIC), 2012
  • John R. Douceur, "The Sybil Attack," in Peer-to-Peer Systems - IPTPS, 2002, pp. 251-260
  • Nadeem AHmed, Salil S. Kanhere and Sanjay Jha, "The Holes Problem in Wireless Sensor Network: A Survey," in Mobile Computing and Communications Review, Volume 1, Number 2
  • Tapalina Bhattasali, Rituparna Chaki and Sugata Sanyal, "Sleep Deprivation Attack Detection in Wireless Sensor Network," in International Journal of Computer Applications, Volume 40, Number 15, 2012
  • Dr. G. Padmavathi, Mrs. D. Shanmugapriya, "A survey of ATtacks, Security Mechanisms and Challenges in Wireless Sensor Networks," in International Journal of Computer Science and Information Security, Volume 4, Number 1, 2009
  • Priyanka S. Fulare and Nikita Chavhan, "False Data Detection in Wireless Sensor Network with Secure Communication," in International Journal of Smart Sensors and AdHoc Networks (IJSSAN), Volume-1, Issue-1, 2011
  • Rabi Prasad Padhy, Manas Ranjan Patra, Suresh Chandra Satapathy, "Cloud Computing: Security Issues and Research Challenges," in International Journal of Computer Science and Information Technology & Security (IJCSITS).
  • Bhupendra Singh Thakur, Sapna Chaudhary, "Content Sniffing Attack Detection in Client and Server Side: A Survey," in International Journal of Advanced Computer Research, Volume 3, Number 2, 2013
  • W. Zhang, B. Qu, Security Architecture of the Internet of Things Oriented to Perceptual Layer, in International Journal on Computer, Consumer and Control (IJ3C), Volume 2, No. 2 (2013)
  • K. E. Emam, F. K. Dankar, Protecting Privacy Using kAnonymity, in Journal of the American Medical Informatics Association, Volume 15, Number 5, 2008
  • C. Liu, Y. Zhang, J. Zeng, L. Peng, R. Chen, Research on Dynamical Security Risk Assessment for the Internet of Things inspired by immunology, in Eighth International Conference on Natural Computation (ICNC), 2012
  • T. Karygiannis, B. Eydt, G. Barber, L. Bunn, T. Phillips, Guidelines for Securing Radio Frequency Identification (RFID) Systems, in Recommendations of National Institute of Standards and Technology
  • Yassine MALEH and Abdellah Ezzati, "A Review of security attacks and Intrusion Detection Schemes inWireless Sensor Networks," in International Journal of Wireless & Mobile Networks (IJWMN), Volume 5, Number 6, 2013
  • Z. Xu, Y. Yin, J. Wang, A Density-based Energy-efficient Clustering Algorithm forWireless Sensor Networks, in International Journal of Future Generation Communication and Networking, Volume 6, Number 1, 2013
  • Shashank Agrawal and Dario Vieira, A survey on Internet of Things.
  • Chen Qiang, Guang-ri Quan, Bai Yu and Liu Yang, Research on Security Issues of the Internet of Things, in International Journal of Future Generation Communication and Networking, Volume 6, Number 6, 2013, pp. 1-10
  • Animesh Patcha, Jung-Min Park, An overview of anomaly detection techniques: Existing solutions and latest technological trends, in Computer Networks, Volume 51, Issue 2, 2007
  • Jayavardhana Gubbi, Rajkumar Buyya, Slaven Marusic and Marimuthu Palaniswami, "Internet of Things (IoT): A vision, architectural elements, and future directions. "
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Internet of Things IoT IoT security goals IoT security challenges and issues IoT security architecture.

Powered by PhDFocusTM