A Survey on the Internet of Things Security

@article{Zhao2013ASO,
  title={A Survey on the Internet of Things Security},
  author={Kai Zhao and Lina Ge},
  journal={2013 Ninth International Conference on Computational Intelligence and Security},
  year={2013},
  pages={663-667}
}
  • K. Zhao, Lina Ge
  • Published 14 December 2013
  • Computer Science
  • 2013 Ninth International Conference on Computational Intelligence and Security
The security issues of the Internet of Things (IoT) are directly related to the wide application of its system. Beginning with introducing the architecture and features of IoT security, this paper expounds several security issues of IoT that exist in the three-layer system structure, and comes up with solutions to the issues above coupled with key technologies involved. Among these safety measures concerned, the ones about perception layer are particularly elaborated, including key management… 

Figures from this paper

A review on security problems and measures of Internet of Things
  • Hanisha Verma, Kaur Chahal
  • Computer Science
    2017 International Conference on Intelligent Computing and Control Systems (ICICCS)
  • 2017
TLDR
This paper analyzes the security problems that occur in the layers: perception layer, network layer and application layer, including the security measures for each layer separately, and explains the affair of IoT security as whole.
Architecture, Features and Security Concern of IoT
TLDR
An overview of the various security issues and opportunities in IoT is given, followed by a comparative analysis of security in IoT and IPv6 followed by various algorithms and security frameworks for IoT.
REVIEW ON SECURITY ISSUES IN IOT
TLDR
Internet of Things (IoT) is an emerging and interesting platform to work on but there is a need of enhanced security to keep the data safe and secured.
A Review of Current Security Issues in Internet of Things
TLDR
This paper presents analysis and survey on IOT security, and provides an overview on proposed countermeasures and challenges of Security.
IOT Perception Layer Security and Privacy
TLDR
The purpose of this paper is to study the various security algorithms to achieve security standards (confidentiality, integrity, privacy) on the perception layer of IOT by comparing the different characteristics of these algorithms.
Review of Internet of Things (IoT): Security Issue and Solution
TLDR
This paper proposes a common survey of the security problems in IoT and the security solutions on all layers for example perception layer, network layer, and application layer of IoT and illustrated that the authentication is one of the most significant security properties.
A perspective on available security techniques in IoT
  • Aanchal Punia, D. Gupta, S. Jaiswal
  • Computer Science
    2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)
  • 2017
TLDR
In this work, the research done in the field of IoT security is categorized as per the security issue concerned and the research gap in the security issues is identified.
Internet of things: Survey on security
TLDR
This work focuses on IoT intrinsic vulnerabilities and their implications to the fundamental information security challenges in confidentiality, integrity, and availability.
SECURITY CONCERNS IN 3-TIER ARCHITECTURAL FRAMEWORK OF INTERNET OF THINGS (IoT)
TLDR
The security and privacy concerns of IoT at every layer of IoT architecture are described and the conclusion and future directions for securing the IoT atevery level so as to maximize the efficiency of IoT systems are presented.
LITERATURE REVIEW ON SECURITY OF IOT
TLDR
The various security parameters in which IoT network system acts a malicious component are discussed, which shows how the network system is not 100 percent accurate in the functioning field.
...
...

References

SHOWING 1-10 OF 24 REFERENCES
Initial Study on IOT Security
TLDR
The concept and three-layer architecture of IOT (Internet of Things), the new security challenge to IOT and its main features including popularity, lightweight, non-symmety, complexity, and the security threats against perception layer, network layer, application layer are summarized.
Cyber-Physical-Social Based Security Architecture for Future Internet of Things
TLDR
An information security model is established to describe the mapping relations among U2IoT, security layer, and security requirement, in which social layer and additional intelligence and compatibility properties are infused into IPM.
Design of security and defense system for home based on Internet of things
TLDR
The experiment results indicate that the system achieves expected effects, and the remote terminal will real-time monitor the home security situation.
Cipher algorithm in data transmission of RFID system on the internet for things
TLDR
A cipher algorithm based on bit-transposition in the RFID system can realize high security by using less computing power and hence enlarge the application area of theRFID system.
SPINS: Security Protocols for Sensor Networks
TLDR
This paper presents a model that works on SPINS security building blocks because Sensor network works in very resource constraint environment and only SP INS security protocol can fulfill those requirements of the proposed model.
HWSN6: Hospital Wireless Sensor Networks Based on 6LoWPAN Technology: Mobility and Fault Tolerance Management
TLDR
An architecture to support medical sensor networks based on 6LoWPAN is presented, where a protocol to carry out inter-WSN mobility is defined, and the other elements of the architecture are exploited with high capacity and resources to decrease the number of interchanged messages.
Multi-Level μ TESLA : A Broadcast Authentication System for Distributed Sensor Networks ∗
TLDR
Multi-level μTESLA satisfies several nice properties, including low over head, tolerance of message loss, scalability to large netwo rks, and resistance to replay attacks as well as denial of service attacks.
Development Trend of IPv6-based Information Security Products in Network Layer of IOT
This paper analyzes the related principles, techniques and other aspects of IPv6 in Internet of Things, and describes the technology and application trends of information security products in the new
Security Characteristic and Technology in the Internet of Things
TLDR
Based on confidentiality, integrity and availability, this paper analyzes the security characteristics and problems in IOT and discusses a framework and some techniques, including the key management, access control, security routing, privacy protecting, intrusion detecting and tolerance.
...
...