Call for Paper

CAE solicits original research papers for the July 2021 Edition. Last date of manuscript submission is June 30, 2021.

Read More

Review of Research Approaches for Securing Communication in Internet of Things

Shamshekhar S. Patil, N. R. Sunitha. Published in Security.

Communications on Applied Electronics
Year of Publication: 2018
Publisher: Foundation of Computer Science (FCS), NY, USA
Authors: Shamshekhar S. Patil, N. R. Sunitha
10.5120/cae2018652746

Shamshekhar S Patil and N R Sunitha. Review of Research Approaches for Securing Communication in Internet of Things. Communications on Applied Electronics 7(13):7-14, February 2018. BibTeX

@article{10.5120/cae2018652746,
	author = {Shamshekhar S. Patil and N. R. Sunitha},
	title = {Review of Research Approaches for Securing Communication in Internet of Things},
	journal = {Communications on Applied Electronics},
	issue_date = {February 2018},
	volume = {7},
	number = {13},
	month = {Feb},
	year = {2018},
	issn = {2394-4714},
	pages = {7-14},
	numpages = {8},
	url = {http://www.caeaccess.org/archives/volume7/number13/798-2018652746},
	doi = {10.5120/cae2018652746},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

With the advent of Internet-of-Things (IoT), the communication has become very much ubiquitous with a faster response by supporting pervasive application demands. However, its resistivity towards adversary is still flawed with its existing security techniques. Owing to the novel nature of IoT, there have been various initiating attempts to introduce secure communication schemes for offering better security features to a diverse range of applications in IoT. This paper contributes to discuss existing research trend towards secure communication among the devices in IoT. The discussion present in the paper is anticipated to assists a snapshot of existing methods and approaches to research-based techniques in IoT.

References

  1. H. Suo, J. Wan, C. Zou and J. Liu, "Security in the Internet of Things: A Review," International Conference on Computer Science and Electronics Engineering, Hangzhou, pp. 648-651, 2012
  2. R. Khan, S. U. Khan, R. Zaheer and S. Khan, "Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges," 10th International Conference on Frontiers of Information Technology, Islamabad, pp. 257-260, 2012
  3. T. Xu, J. B. Wendt, and M. Potkonjak, "Security of IoT systems: Design challenges and opportunities," 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), San Jose, CA, pp. 417-423, 2014
  4. R. Roman, J. Zhou, and J. Lopez, "On the features and challenges of security and privacy in distributed internet of things," Computer Networks 57.10, pp.2266-2279, 2013
  5. T. Borgohain, U. Kumar, and S. Sanyal, "Survey of security and privacy issues of Internet of Things," arXiv preprint arXiv:1501.02211, 2015
  6. M. Kranz, P. Holleis, and A. Schmidt, “Embedded interaction: Interacting with the internet of things," IEEE internet computing, vol. 14.2, pp.46-53, 2010
  7. J. Gubbi, “Internet of Things (IoT): A vision, architectural elements, and future directions," Future generation computer systems, vol. 29.7, pp.1645-1660, 2013
  8. V. Adat and B. B. Gupta, "Security in Internet of Things: issues, challenges, taxonomy, and architecture," Telecommunication Systems, pp.1-19, 2017
  9. S. Verma, “A Survey on Network Methodologies for Real-Time Analytics of Massive IoT Data and Open Research Issues," IEEE Communications Surveys & Tutorials, 2017
  10. A. Alrawais, "Fog Computing for the Internet of Things: Security and Privacy Issues," IEEE Internet Computing, vol. 21 (2), pp. 34-42, 2017
  11. A.K. Pathak, “Security Challenges in Internet of Things (IoT)," International Journals of Advanced Research in Computer Science and Software Engineering, 2017
  12. C. Sarkar, “DIAT: A scalable distributed architecture for IoT," IEEE Internet of Things Journal, vol. 2(3), pp.230-239, 2015
  13. K-H. Yeh, “A Secure IoT-Based Healthcare System with Body Sensor Networks," IEEE Access, vol. 4, pp.10288-10299, 2016
  14. Y-B. Lin, “EasyConnect: A management system for IoT devices and its applications for interactive design and art," IEEE Internet of Things Journal, vol. 2(6), pp.551-561, 2015
  15. Y. Shi, “An Obfuscatable Aggregatable Signcryption Scheme for Unattended Devices in IoT Systems," IEEE Internet of Things Journal, 2017
  16. A. Sajid, H. Abbas, and K. Saleem, “Cloud-assisted IoT-based SCADA systems security: A review of the state of the art and future challenges," IEEE Access, vol. 4, pp.1375-1384, 2016
  17. R. Arshad, “Green IoT: An Investigation on Energy Saving Practices for 2020 and Beyond”, IEEE Access, 2017
  18. M. Yasin, “Ultra-Low Power, Secure IoT Platform for Predicting Cardiovascular Diseases," IEEE Transactions on Circuits and Systems I: Regular Papers, 2017
  19. F. Conti, Francesco, “An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics," IEEE Transactions on Circuits and Systems I: Regular Papers, 2017
  20. S-M. Cheng, “Traffic-aware Patching for Cyber Security in Mobile IoT," arXiv preprint arXiv: 1703.05400, 2017
  21. S. Koteshwara and A. Das, “Comparative study of Authenticated Encryption targeting lightweight IoT applications," IEEE Design & Test, 2017
  22. S. Kubler, “Open IoT Ecosystem for Sporting Event Management," IEEE Access, vol. 5, pp.7064-7079, 2017
  23. D. Kwon, “IoT-based prognostics and systems health management for industrial applications," IEEE Access, vol. 4, pp.3659-3670, 2016.
  24. C. Hennebert and J.D. Santos, “Security protocols and privacy issues into 6LoWPAN stack: a synthesis”, IEEE Internet of Things Journal, vol.1(5), pp. 384, 2014.

Keywords

Authentication, Actuators, Internet-of-Things, Security, Sensors