Open Access Open Access  Restricted Access Subscription or Fee Access

Security Issues in the Internet of Things (IoT): A Gap Analysis

M. Sridhar, Dr. P. B. Pankajavalli, G. S. Karthick, M. Gurudharsan

Abstract


Wireless communication networks are highly prone to security threats. The major applications of wireless communication networks are in military, business, healthcare, retail, and transportations. This system is used as wired, cellular or ad hoc networks. Wireless sensor networks, actuators networks, and vehicular networks have received a great attention in society and industry. In recent years, the Internet of Things (IoT) has received outsized research attention. The IoT is considering as future of the internet. In future, IoT will play a vital role and will change our living styles, standards, as well as business models. The usage of IoT in different applications rises quickly in coming years. The IoT will connect billions of devices, peoples, and services to share their information. The increased usage of IoT devices, the IoT networks are prone to various security attacks. The utilize efficient security; privacy protocols in IoT networks is extremely needed to make sure confidentiality, authentication, access control, and integrity, among others. In this paper work, an extensive complete study on security and privacy issues in IoT networks is provided.


Keywords


Cellular Network, IoT Security, Privacy Issues.

Full Text:

PDF

References


J. S. Kumar and D. R. Patel, “A survey on internet of things: Security and privacy issues,” International Journal of Computer Applications, vol. 90, no. 11, 2014.

M. Abomhara and G. M. Køien, “Security and privacy in the internet of things: Current status and open issues,” in Privacy and Security in Mobile Systems (PRISMS), International Conference on IEEE, pp. 1-8, 2014.

S. Chen, H. Xu, D. Liu, B. Hu, and H. Wang, “A vision of iot: Applications, challenges, and opportunities with china perspective,” IEEE Internet of Things journal, vol. 1, no. 4, pp. 349–359, 2014.

L. Atzori, A. Iera, and G. Morabito, “The internet of things: A survey,” Computer Networks, vol. 54, no. 15, pp. 2787–2805, Oct 2010.

M. M. Hossain, M. Fotouhi, and R. Hasan, “Towards an analysis of security issues, challenges, and open problems in the internet of things,” in Services (SERVICES), IEEE World Congress on IEEE, pp. 21–28, 2015.

L. Da Xu, W. He, and S. Li, “Internet of things in industries: A survey,” IEEE Transactions on industrial informatics, vol. 10, no. 4, 2233– 2243, 2014.

L. M. R. Tarouco, L. M. Bertholdo, L. Z. Granville, L. M. R. Arbiza, F. Carbone, M. Marotta, and J. J. C. de Santanna, “Internet of things in healthcare: Interoperatibility and security issues,” in Communications (ICC), IEEE International Conference on IEEE, pp. 6121–6125, 2012.

Mohan, “Cyber security for personal medical devices internet of things,” in Distributed Computing in Sensor Systems (DCOSS), 2014.

R. H. Weber, “Internet of things–new security and privacy challenges”, Computer law & security review, vol. 26, no. 1, pp. 23–30, 2010.

S. Babar, P. Mahalle, A. Stango, N. Prasad, and R. Prasad, “Proposed security model and threat taxonomy for the internet of things (IoT),” in International Conference on Network Security and Applications. Springer, pp. 420–429, 2010.

S. Yoon, H. Park, and H. S. Yoo, “Security issues on smarthome in IoT environment,” in Computer Science and its Applications. Springer, 2015, pp. 691–696.




DOI: http://dx.doi.org/10.36039/AA022018003.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.