• Corpus ID: 58981813

Internet of Things Security, Device Authentication and Access Control: A Review

@article{Ali2019InternetOT,
  title={Internet of Things Security, Device Authentication and Access Control: A Review},
  author={Inayat Ali and Sonia Sabir and Zahid Ullah},
  journal={ArXiv},
  year={2019},
  volume={abs/1901.07309}
}
The Internet of Things (IoT) is one of the emerging technologies that has grabbed the attention of researchers from academia and industry. The idea behind Internet of things is the interconnection of internet enabled things or devices to each other and to humans, to achieve some common goals. In near future IoT is expected to be seamlessly integrated into our environment and human will be wholly solely dependent on this technology for comfort and easy life style. Any security compromise of the… 

Tables from this paper

IOT Security Threats and Block Chain based Solutions

The threats and vulnerabilities to the security of IoT devices in different domains, different layers, its deployment architecture and possible Block chain solution to overcome these issues are discussed and how the Block chain technology can be used to provide security and privacy in IoT is analyzed.

Security and Privacy Issues in IoT Environment

This study tries to summarize this IoT security issues in terms of primary information security concepts confidentiality, integrity and availability with regards to its architecture.

Issues and Solution Techniques for IoT Security and Privacy - A Survey

The security and privacy concerns of IoT-based smart connected healthcare applications are addressed, and a bio-inspired optimization trained model is designed to overcome the challenges.

A Survey on Internet-of-Things Security: Threats and Emerging Countermeasures

This paper provides a comprehensive taxonomy of the major security issues based on IoT architecture, attack implications and application areas, and tabulate and map the different countermeasures used to solve these threats taking into account new advances in security approaches.

Design a secure IoT Architecture using Smart Wireless Networks

An overview of various layered IoT architectures, a review of common security attacks from the perspective of the layer, and the best techniques against these attacks are provided, and an enhanced layered IoT architecture is proposed, which will be protected against several security attacks.

On the security aspects of Internet of Things: A systematic literature review

The protocol adopted to perform the SLR is described and the state-of-the-art on the field is presented by describing the main techniques reported in the retrieved studies by the first study to compile information on a comprehensive set of security aspects in IoT.

Preserving Data Confidentiality in Internet of Things

A hybrid algorithm designed to preserve data confidentiality in IoT is proposed, a combination of Message Digest algorithm (MD5), Elliptic Curve Cryptography (ECC), and Advanced Encryption Standard (AES) algorithms.

Review of Internet of Things (IoT): Security Issue and Solution

This paper proposes a common survey of the security problems in IoT and the security solutions on all layers for example perception layer, network layer, and application layer of IoT and illustrated that the authentication is one of the most significant security properties.

A Secure Network Architecture for Heterogeneous IoT Devices using Role-based Access Control

A novel IoT security framework using role-based strategy to limit user's device manageability and to protect the IoT network is proposed to mitigate adversarial effects by improving monitoring capabilities to take corrective action and preventive action faster in the heterogeneous IoT devices network.

IoT Modes of Operations with Different Security Key Management Techniques: A Survey

A classification of IoT modes of operation based on the distribution of IoT devices, connectivity to the internet, and the typical field of application is presented to help designers select the optimum security technique that provides the best balance between the required security level and IoT system mode constraints.
...

References

SHOWING 1-10 OF 48 REFERENCES

Threat-Based Security Analysis for the Internet of Things

A threat model based on use-cases of IoT is provided, which can be used to determine where efforts should be invested in order to secure these systems and recommend measures that will help in providing security and assuring privacy when using IoT.

An authentication and access control framework for CoAP-based Internet of Things

A CoAP-based framework for service-level access control on low-power devices is presented to provide a holistic framework for secure SOA-based low power networks comprise by resource constrain devices.

Security for IoT: An effective DTLS with public certificates

  • Mukul PanwarAjay Kumar
  • Computer Science
    2015 International Conference on Advances in Computer Engineering and Applications
  • 2015
This work aims to introduce a CA for the communication and to provide some results that can show its improved performance in contrast to the pre-shared key communication.

Security challenges of the internet of things

  • Mario WeberM. Boban
  • Computer Science
    2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)
  • 2016
This paper gives an insight into the most important security challenges related to implementation of IoT and building appropriate regulatory framework, crucial for the development of IoT services due to adequate legal security companies will get.

Threshold Cryptography-based Group Authentication (TCGA) scheme for the Internet of Things (IoT)

  • P. MahalleN. PrasadR. Prasad
  • Computer Science
    2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE)
  • 2014
This paper presents novel Threshold Cryptography-based Group Authentication (TCGA) scheme for the IoT which verifies authenticity of all the devices taking part in the group communication and shows that TCGA scheme is lightweight, and alleviates the effect of battery exhaustion attack.

Study on security architecture in the Internet of Things

  • Hui LiXin Zhou
  • Computer Science
    Proceedings of 2012 International Conference on Measurement, Information and Control
  • 2012
The security requirements in different layers of the lOT are analyzed to establish a security architecture system for the expecting to offer a theoretical reference for the establishment of reliable security systems of information for the in the future.

A Survey on the Internet of Things Security

  • K. ZhaoLina Ge
  • Computer Science
    2013 Ninth International Conference on Computational Intelligence and Security
  • 2013
This paper expounds several security issues of IoT that exist in the three-layer system structure, and comes up with solutions to the issues above coupled with key technologies involved.

A lightweight authentication protocol for Internet of Things

This paper proposes an encryption method based on XOR manipulation, instead of complex encryption such as using the hash function, for anti-counterfeiting and privacy protection, and enhances the security and hardware design methodology.

Security Architecture and Key Technologies for IoT/CPS

This paper proposes an hierarchical security architecture based on threat analysis and security requirements and discusses key technologies associated with privacy preservation, secure control, and cross-network authentication.

Denial-of-Service detection in 6LoWPAN based Internet of Things

A denial-of-service (DoS) detection architecture for 6LoWPAN, the standard protocol designed by IETF as an adaptation layer for low-power lossy networks enabling low- power devices to communicate with the Internet, is presented.