IoT Security: Ongoing Challenges and Research Opportunities

  title={IoT Security: Ongoing Challenges and Research Opportunities},
  author={Zhi-Kai Zhang and Michael Cheng Yi Cho and Chi-Wei Wang and Chia-Wei Hsu and Chong Kuan Chen and Shiuh-Pyng Shieh},
  journal={2014 IEEE 7th International Conference on Service-Oriented Computing and Applications},
The Internet of Things (IoT) opens opportunities for wearable devices, home appliances, and software to share and communicate information on the Internet. Given that the shared data contains a large amount of private information, preserving information security on the shared data is an important issue that cannot be neglected. In this paper, we begin with general information security background of IoT and continue on with information security related challenges that IoT will encountered… 
Security Challenges and Countermeasures for the Heterogeneity of IoT Applications
The Internet of Things (IoT) enables the integration of data from virtual and physical worlds. It involves smart objects that can understand and react to their environment in a variety of industrial,
Emerging Security Threats and Countermeasures in IoT
This paper enumerate the IoT communication scenarios and investigate the threats to the large-scale, unreliable, pervasive computing environment and various authentication schemes will be evaluated to ensure the confidentiality and integrity of the exchanged data.
A New Secure Model for IoT Devices
  • Zhe Weng, Renjie Liu, X. Li
  • 2020 IEEE 5th Information Technology and Mechatronics Engineering Conference (ITOEC)
  • 2020
The rapid development of Internet of Things makes corresponding secure issues, such as invasions from the Internet, more and more concerned. And the growing quantity of IoT devices takes the IPv6
A New Secure Model for IoT Devices
A model to enhance the IoT device security is introduced, which hides IoT devices against invasions by using vast IPv6 address space by using addressless and watchdog, and avoids the IoT devices from security issues caused by lack of management.
Internet of Things Security: A Review of Enabled Application Challenges and Solutions
A review of IoT application areas in smart cities, smart homes, and smart healthcare that leverage such techniques from the point of view of security and privacy and present relevant challenges is presented.
A Comprehensive Analysis on the Security Threats and their Countermeasures of IoT
This paper analyzes different security issues, their counter measures and discusses the future directions of security in IoT, and essential technologies of security like encryption in the scenario of IoT for the prevention of harmful threats in the light of latest research.
IoT Evolution and Security Challenges in Cyber Space
  • Uma N. Dulhare, S. Rasool
  • Computer Science
    Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems
  • 2019
The chapter walks through the security problems that are seen with IoT devices that continues to highlight how vulnerable these devices are when faced with modern, sophisticated cyber threats.
A Review on Security and Privacy Issues and Challenges in Internet of Things
Internet of Things (IoT) is an interconnected wireless network where smart nodes (IoT devices) interact with each other in order to exchange data through the communicating medium. IoT technology has
Multimedia security perspectives in IoT
A solution which can preserve the privacy of multimedia data within an IoT environment atits perception layer is proposed, which will support the multimedia to function effectively, while at the same time preserving the confidentiality of the information transmitted and the Privacy of individuals.
Internet of Things: Purview, Challenges and Probability
Internet of things is becoming one of the most popular technologies nowadays that opens chances for home machines, wearable gadgets, and software to share and convey data on the Internet. It has many


Study on Security Problems and Key Technologies of the Internet of Things
  • X. Xiaohui
  • Computer Science
    2013 International Conference on Computational and Information Sciences
  • 2013
The security issues and key technologies in the Internet of Things are addressed and the basic concepts and the principle of the IOT are elaborated and the relevant characteristics of theIOT are combined.
Lithe: Lightweight Secure CoAP for the Internet of Things
Lithe-an integration of DTLS and CoAP for the IoT is presented and a novel DTLS header compression scheme is proposed that aims to significantly reduce the energy consumption by leveraging the 6LoWPAN standard.
Securing the Internet of Things
This paper presents security of Internet of things. In the Internet of Things vision, every physical object has a virtual component that can produce and consume services Such extreme interconnection
Authentication and Access Control in the Internet of Things
  • Jing Liu, Yang Xiao, C. Chen
  • Computer Science
    2012 32nd International Conference on Distributed Computing Systems Workshops
  • 2012
This paper mainly analyzes existing authentication and access control methods, and then, it designs a feasible one for the Internet of Things.
Cyberentity Security in the Internet of Things
A proposed Internet of Things system architecture offers a solution to the broad array of challenges researchers face in terms of general system security, network security, and application security.
The Internet of Things in an Enterprise Context
This paper puts the Internet of Things in a wider context: How it relates to the Future Internet overall, and where the business value lies so that it will become interesting for enterprises to
Identities in the Future Internet of Things
The paper presents two approaches to cope with the problem of security and putting the user back in control despite the move to the Internet of things: The Identinet and a concept designated by the digital shadow.
Towards a definition of the Internet of Things ( IoT )
  • 2015
ion Yes No Partly Availability / Mobility No No No Fault tolerance Partly No Partly Flexibility/Event based Yes Partly Partly Uncertainty of Information No No No
Networked RFID Systems and Lightweight Cryptography
This book is a comprehensive guide to networks of Radio Frequency Identification (RFID) based Electronic Product Codes (EPCs) in supply chains, and its topics range from standardised hardware designs
Securing building management systems using named data networking
This article proposes a data-centric BMS design that uses named data networking, one of the proposed information-centric networking architecture designs, and has been deployed on a UCLA campus testbed.