IoT Security: Ongoing Challenges and Research Opportunities

  title={IoT Security: Ongoing Challenges and Research Opportunities},
  author={Zhi-Kai Zhang and Michael Cheng Yi Cho and Chi-Wei Wang and Chia-Wei Hsu and Chong Kuan Chen and Shiuh-Pyng Shieh},
  journal={2014 IEEE 7th International Conference on Service-Oriented Computing and Applications},
The Internet of Things (IoT) opens opportunities for wearable devices, home appliances, and software to share and communicate information on the Internet. Given that the shared data contains a large amount of private information, preserving information security on the shared data is an important issue that cannot be neglected. In this paper, we begin with general information security background of IoT and continue on with information security related challenges that IoT will encountered… 

Security Challenges and Countermeasures for the Heterogeneity of IoT Applications

The Internet of Things (IoT) enables the integration of data from virtual and physical worlds. It involves smart objects that can understand and react to their environment in a variety of industrial,

Emerging Security Threats and Countermeasures in IoT

This paper enumerate the IoT communication scenarios and investigate the threats to the large-scale, unreliable, pervasive computing environment and various authentication schemes will be evaluated to ensure the confidentiality and integrity of the exchanged data.

A New Secure Model for IoT Devices

  • Zhe WengRenjie LiuXing Li
  • Computer Science
    2020 IEEE 5th Information Technology and Mechatronics Engineering Conference (ITOEC)
  • 2020
A model to enhance the IoT device security is introduced, which hides IoT devices against invasions by using vast IPv6 address space by using addressless and watchdog, and avoids the IoT devices from security issues caused by lack of management.

A New Secure Model for IoT Devices

A model to enhance the IoT device security is introduced, which hides IoT devices against invasions by using vast IPv6 address space by using addressless and watchdog, and avoids the IoT devices from security issues caused by lack of management.

Internet of Things Security: A Review of Enabled Application Challenges and Solutions

A review of IoT application areas in smart cities, smart homes, and smart healthcare that leverage such techniques from the point of view of security and privacy and present relevant challenges is presented.

A Comprehensive Analysis on the Security Threats and their Countermeasures of IoT

This paper analyzes different security issues, their counter measures and discusses the future directions of security in IoT, and essential technologies of security like encryption in the scenario of IoT for the prevention of harmful threats in the light of latest research.

IoT Evolution and Security Challenges in Cyber Space

  • U. N. DulhareS. Rasool
  • Computer Science
    Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems
  • 2019
The chapter walks through the security problems that are seen with IoT devices that continues to highlight how vulnerable these devices are when faced with modern, sophisticated cyber threats.

Internet of Things: Purview, Challenges and Probability

This paper starts with general information of IoT and continues on with the challenges and summarized with future opportunities, pointing out some research directions that could be the further work for the solutions to the security challenges that IoT experienced.

IoT Security Challenges and Counters Measures

In this article, many security challenge and counters measures and research objectives are studied in IoT.

Survey on Security Threats and Algorithms in Internet of Things Environment

This paper examines security mechanism and algorithm for IoT networks, which need to be effective, energy effective and computing effective.



Study on Security Problems and Key Technologies of the Internet of Things

  • X. Xiaohui
  • Computer Science
    2013 International Conference on Computational and Information Sciences
  • 2013
The security issues and key technologies in the Internet of Things are addressed and the basic concepts and the principle of the IOT are elaborated and the relevant characteristics of theIOT are combined.

Lithe: Lightweight Secure CoAP for the Internet of Things

Lithe-an integration of DTLS and CoAP for the IoT is presented and a novel DTLS header compression scheme is proposed that aims to significantly reduce the energy consumption by leveraging the 6LoWPAN standard.

Securing the Internet of Things

This paper presents security of Internet of things. In the Internet of Things vision, every physical object has a virtual component that can produce and consume services Such extreme interconnection

Authentication and Access Control in the Internet of Things

This paper mainly analyzes existing authentication and access control methods, and then, it designs a feasible one for the Internet of Things.

Cyberentity Security in the Internet of Things

A proposed Internet of Things system architecture offers a solution to the broad array of challenges researchers face in terms of general system security, network security, and application security.

The Internet of Things in an Enterprise Context

This paper puts the Internet of Things in a wider context: How it relates to the Future Internet overall, and where the business value lies so that it will become interesting for enterprises to

Identities in the Future Internet of Things

The paper presents two approaches to cope with the problem of security and putting the user back in control despite the move to the Internet of things: The Identinet and a concept designated by the digital shadow.

Towards a definition of the Internet of Things ( IoT )

  • Computer Science
  • 2015
This research compared the impact of natural disasters on the availability and mobility of goods and services and found that natural disasters had a negative impact on the quality of the products and services that were available.

Networked RFID Systems and Lightweight Cryptography

This book is a comprehensive guide to networks of Radio Frequency Identification (RFID) based Electronic Product Codes (EPCs) in supply chains, and its topics range from standardised hardware designs

Securing building management systems using named data networking

This article proposes a data-centric BMS design that uses named data networking, one of the proposed information-centric networking architecture designs, and has been deployed on a UCLA campus testbed.