IoT Security: Ongoing Challenges and Research Opportunities
@article{Zhang2014IoTSO, title={IoT Security: Ongoing Challenges and Research Opportunities}, author={Zhi-Kai Zhang and Michael Cheng Yi Cho and Chi-Wei Wang and Chia-Wei Hsu and Chong Kuan Chen and Shiuh-Pyng Shieh}, journal={2014 IEEE 7th International Conference on Service-Oriented Computing and Applications}, year={2014}, pages={230-234} }
The Internet of Things (IoT) opens opportunities for wearable devices, home appliances, and software to share and communicate information on the Internet. Given that the shared data contains a large amount of private information, preserving information security on the shared data is an important issue that cannot be neglected. In this paper, we begin with general information security background of IoT and continue on with information security related challenges that IoT will encountered…
451 Citations
Security Challenges and Countermeasures for the Heterogeneity of IoT Applications
- Computer ScienceJournal of Autonomous Intelligence
- 2019
The Internet of Things (IoT) enables the integration of data from virtual and physical worlds. It involves smart objects that can understand and react to their environment in a variety of industrial,…
Emerging Security Threats and Countermeasures in IoT
- Computer ScienceAsiaCCS
- 2015
This paper enumerate the IoT communication scenarios and investigate the threats to the large-scale, unreliable, pervasive computing environment and various authentication schemes will be evaluated to ensure the confidentiality and integrity of the exchanged data.
A New Secure Model for IoT Devices
- Computer Science2020 IEEE 5th Information Technology and Mechatronics Engineering Conference (ITOEC)
- 2020
A model to enhance the IoT device security is introduced, which hides IoT devices against invasions by using vast IPv6 address space by using addressless and watchdog, and avoids the IoT devices from security issues caused by lack of management.
A New Secure Model for IoT Devices
- Computer Science
- 2020
A model to enhance the IoT device security is introduced, which hides IoT devices against invasions by using vast IPv6 address space by using addressless and watchdog, and avoids the IoT devices from security issues caused by lack of management.
Internet of Things Security: A Review of Enabled Application Challenges and Solutions
- Computer Science
- 2021
A review of IoT application areas in smart cities, smart homes, and smart healthcare that leverage such techniques from the point of view of security and privacy and present relevant challenges is presented.
A Comprehensive Analysis on the Security Threats and their Countermeasures of IoT
- Computer Science
- 2017
This paper analyzes different security issues, their counter measures and discusses the future directions of security in IoT, and essential technologies of security like encryption in the scenario of IoT for the prevention of harmful threats in the light of latest research.
IoT Evolution and Security Challenges in Cyber Space
- Computer ScienceCountering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems
- 2019
The chapter walks through the security problems that are seen with IoT devices that continues to highlight how vulnerable these devices are when faced with modern, sophisticated cyber threats.
A Review on Security and Privacy Issues and Challenges in Internet of Things
- Computer Science
- 2020
IoT security and privacy issues that negatively impact the IoT systems are introduced and a critical analysis of the attacks based on IoT layers and attack taxonomy is given.
Multimedia security perspectives in IoT
- Computer Science2016 Sixth International Conference on Innovative Computing Technology (INTECH)
- 2016
A solution which can preserve the privacy of multimedia data within an IoT environment atits perception layer is proposed, which will support the multimedia to function effectively, while at the same time preserving the confidentiality of the information transmitted and the Privacy of individuals.
Internet of Things: Purview, Challenges and Probability
- Computer Science
- 2019
This paper starts with general information of IoT and continues on with the challenges and summarized with future opportunities, pointing out some research directions that could be the further work for the solutions to the security challenges that IoT experienced.
References
SHOWING 1-10 OF 23 REFERENCES
Study on Security Problems and Key Technologies of the Internet of Things
- Computer Science2013 International Conference on Computational and Information Sciences
- 2013
The security issues and key technologies in the Internet of Things are addressed and the basic concepts and the principle of the IOT are elaborated and the relevant characteristics of theIOT are combined.
Lithe: Lightweight Secure CoAP for the Internet of Things
- Computer ScienceIEEE Sensors Journal
- 2013
Lithe-an integration of DTLS and CoAP for the IoT is presented and a novel DTLS header compression scheme is proposed that aims to significantly reduce the energy consumption by leveraging the 6LoWPAN standard.
Securing the Internet of Things
- Computer ScienceComputer
- 2011
This paper presents security of Internet of things. In the Internet of Things vision, every physical object has a virtual component that can produce and consume services Such extreme interconnection…
Authentication and Access Control in the Internet of Things
- Computer Science2012 32nd International Conference on Distributed Computing Systems Workshops
- 2012
This paper mainly analyzes existing authentication and access control methods, and then, it designs a feasible one for the Internet of Things.
Cyberentity Security in the Internet of Things
- Computer ScienceComputer
- 2013
A proposed Internet of Things system architecture offers a solution to the broad array of challenges researchers face in terms of general system security, network security, and application security.
The Internet of Things in an Enterprise Context
- Business, Computer ScienceFIS
- 2008
This paper puts the Internet of Things in a wider context: How it relates to the Future Internet overall, and where the business value lies so that it will become interesting for enterprises to…
Identities in the Future Internet of Things
- Computer ScienceWirel. Pers. Commun.
- 2009
The paper presents two approaches to cope with the problem of security and putting the user back in control despite the move to the Internet of things: The Identinet and a concept designated by the digital shadow.
Towards a definition of the Internet of Things ( IoT )
- Computer Science
- 2015
This research compared the impact of natural disasters on the availability and mobility of goods and services and found that natural disasters had a negative impact on the quality of the products and services that were available.
Networked RFID Systems and Lightweight Cryptography
- Computer Science
- 2008
This book is a comprehensive guide to networks of Radio Frequency Identification (RFID) based Electronic Product Codes (EPCs) in supply chains, and its topics range from standardised hardware designs…
Securing building management systems using named data networking
- Computer ScienceIEEE Network
- 2014
This article proposes a data-centric BMS design that uses named data networking, one of the proposed information-centric networking architecture designs, and has been deployed on a UCLA campus testbed.