A Survey on Internet of Things

Authors

  • Anjali Sharma  Department of Computer Science & Engineering, Shri Shankaracharya Engineering College, Bhilai, Chhattisgarh, India
  • Shankar Sharan Tripathi  Department of Computer Science & Engineering, Shri Shankaracharya Engineering College, Bhilai, Chhattisgarh, India
  • Radheshyam Panda  Department of Computer Science & Engineering, Shri Shankaracharya Engineering College, Bhilai, Chhattisgarh, India

Keywords:

Internet of things, Security, Privacy, Trust, Web.

Abstract

Nowadays, internet of things (IoT) has been the main focus to advance research fields. Security, reliability, authenticity, and privacy are the major issues for the internet of things. The challenges are to avoid the development of such models to ease and bound their impact In order to make possible this emerging field. In the Internet of Things, we use centralized architectures for services, in which central database provide all information and according to that information, centralized system proceed further. In other words, we can say that in IOT all the nodes are collaborating in dynamically in the network for exchanging their information. Alternatively, centralized distributed architectures, where entities at the edge of the network exchange information and collaborate with each other in a dynamic way, can also be used. In this paper, we discuss the research status of security and privacy of IOT and various challenges also.

References

  1. Hongmei Deng, Wei Li, and Dharma P. Agrawal, Routing Security in Wireless Ad Hoc Networks, IEEE Communications Magazine, Pp: 70-75, October 2002.
  2. Daniele Puccinelli and Martin Haenggi, "Wireless Sensor Networks: Applications and Challenges of Ubiquitous Sensing ",IEEE circuits and systems magazine third quarter 2005.
  3. Ye Ming Luand Vincent W. S. Wong, "an energy efficient multipath routing protocol for wireless sensor networks" international journal of communication systems, 2007; 20:747-766, in Wiley Inter Science (www.interscience.wiley.com).
  4. Zoran S. Bojkovic, Bojan M. Bakmaz, and Miodrag R. Bakmaz, "Security Issues in Wireless Sensor Networks", International journal of communications Issue 1, Volume 2, 2008.
  5. Fadi Hamad, Leonid Smalov and Anne James, "Energy-aware Security in M-Commerce and the Internet of Things", IETE TECHNICAL REVIEW | vol 26 | ISSUE 5 | SEP-oct 2009, Pp: 357-362.
  6. Cristina Alcaraz, Pablo Najera, Javier Lopez and Rodrigo Roman, "Wireless Sensor Networks and the Internet of Things: Do They Need a Complete Integration?", International Workshop on the Security of the Internet of Things (SecIoT10), 2010.
  7. Rolf H. Weber, "Internet of Things - New security and privacy challenges", computer law & security review 26 (2010) 23-30.
  8. Debasis Bandyopadhyay and Jaydip Sen, "Internet of Things: Applications and Challenges in Technology and Standardization", Springer, Wireless Pers Commun (2011) 58:49-69.
  9. H. Weber, "Internet of things - new security and privacy challenges," Computer Law & Security Review, vol. 26, pp. 23-30, 2010.
  10. F. Wan, H. H. Yan, H. Suo, and F. Li, "Advances in cyber-physical systems research," KSII Transactions on Internet and Information Systems, 2011, 5(11): 1891-1908.
  11. Chen, J. F. Wan, and F. Li, "Machine-to-machine communications: architectures, standards, and applications," KSII Transactions on Internet and Information Systems, to appear, January 2012.
  12. Yang, J. Xu, W. Chen, Z. H. Qi, and H. Y. Wang, "Security characteristic and technology in the internet of things," Journal of Nanjing University of Posts and Telecommunications (Natural Science), vol. 30, no. 4, Aug 2010.
  13. H. Hu, "The research of several key question of internet of things," in Proc. of 2011 Int. Conf. on Intelligence Science and Information Engineering, pp. 362-365.
  14. Hui Suo, Jiafu Wan, Caifeng Zou and Jianqi Liu "Security in the Internet of Things: A Review", IEEE, 2012 International Conference on Computer Science and Electronics Engineering, Pp:648 -651
  15. Na Ruan andYoshiaki Hori, "DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of Things", IEEE, 2012 International Conference on Selected Topics in Mobile and Wireless Networking, Pp: 60-65.
  16. Huansheng Ning and Hong Liu, "Cyber-Physical-Social Based Security Architecture for Future Internet of Things", scientific research,Advances in Internet of Things, 2012, 2, 1-7
  17. Rene Hummen, Hanno Wirtz, Jan Henrik Ziegeldorf, Jens Hiller and Klaus Wehrle, "Tailoring End-to-End IP Security Protocols to the Internet of Things" 978-1-4799-1270-4/13/$31.00, 2013 IEEE
  18. Rodrigo Roman, Jianying Zhou and Javier Lopez "On the features and challenges of security and privacy in distributed internet of things" 2013 Elsevier, Computer Networks xxx (2013) , Pp: 1-14.
  19. Qi Jing, Athanasios V. Vasilakos, Jiafu Wan, Jingwei Lu and Dechao Qiu, "Security of the Internet of Things: perspectives and challenges", Springer, online june 2014, DOI 10.1007/s11276-014-0761-7
  20. Lee & Kyoochun Lee, "The Internet of Things (IoT): Applications, investments, and challenges for enterprises", Business Horizons (2015) 58, 431—440
  21. Ala Al-Fuqaha, Mohsen Guizani, Mehdi Mohammadi, Mohammed Aledhari and Moussa Ayyash "Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications", IEEE COMMUNICATION SURVEYS & TUTORIALS, VOL. 17, NO. 4, FOURTH QUARTER 2015
  22. Afreen Fatima Mohammed studied about "Security Issues in IoT", 2017 IJSRSET | Volume 3 | Issue 8 | Print ISSN: 2395-1990 | Online ISSN : 2394-4099 Pp: (3) 8 : 933-940.

Use the JavaScript minifier to compress the code before you publish a website.

Downloads

Published

2018-10-30

Issue

Section

Research Articles

How to Cite

[1]
Anjali Sharma, Shankar Sharan Tripathi, Radheshyam Panda, " A Survey on Internet of Things, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 7, pp.300-308, September-October-2018.