Call for Paper
CAE solicits original research papers for the April 2023 Edition. Last date of manuscript submission is March 31, 2023.
Review of Research Approaches for Securing Communication in Internet of Things
Shamshekhar S Patil and N R Sunitha. Review of Research Approaches for Securing Communication in Internet of Things. Communications on Applied Electronics 7(13):7-14, February 2018. BibTeX
@article{10.5120/cae2018652746, author = {Shamshekhar S. Patil and N. R. Sunitha}, title = {Review of Research Approaches for Securing Communication in Internet of Things}, journal = {Communications on Applied Electronics}, issue_date = {February 2018}, volume = {7}, number = {13}, month = {Feb}, year = {2018}, issn = {2394-4714}, pages = {7-14}, numpages = {8}, url = {http://www.caeaccess.org/archives/volume7/number13/798-2018652746}, doi = {10.5120/cae2018652746}, publisher = {Foundation of Computer Science (FCS), NY, USA}, address = {New York, USA} }
Abstract
With the advent of Internet-of-Things (IoT), the communication has become very much ubiquitous with a faster response by supporting pervasive application demands. However, its resistivity towards adversary is still flawed with its existing security techniques. Owing to the novel nature of IoT, there have been various initiating attempts to introduce secure communication schemes for offering better security features to a diverse range of applications in IoT. This paper contributes to discuss existing research trend towards secure communication among the devices in IoT. The discussion present in the paper is anticipated to assists a snapshot of existing methods and approaches to research-based techniques in IoT.
References
- H. Suo, J. Wan, C. Zou and J. Liu, "Security in the Internet of Things: A Review," International Conference on Computer Science and Electronics Engineering, Hangzhou, pp. 648-651, 2012
- R. Khan, S. U. Khan, R. Zaheer and S. Khan, "Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges," 10th International Conference on Frontiers of Information Technology, Islamabad, pp. 257-260, 2012
- T. Xu, J. B. Wendt, and M. Potkonjak, "Security of IoT systems: Design challenges and opportunities," 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), San Jose, CA, pp. 417-423, 2014
- R. Roman, J. Zhou, and J. Lopez, "On the features and challenges of security and privacy in distributed internet of things," Computer Networks 57.10, pp.2266-2279, 2013
- T. Borgohain, U. Kumar, and S. Sanyal, "Survey of security and privacy issues of Internet of Things," arXiv preprint arXiv:1501.02211, 2015
- M. Kranz, P. Holleis, and A. Schmidt, “Embedded interaction: Interacting with the internet of things," IEEE internet computing, vol. 14.2, pp.46-53, 2010
- J. Gubbi, “Internet of Things (IoT): A vision, architectural elements, and future directions," Future generation computer systems, vol. 29.7, pp.1645-1660, 2013
- V. Adat and B. B. Gupta, "Security in Internet of Things: issues, challenges, taxonomy, and architecture," Telecommunication Systems, pp.1-19, 2017
- S. Verma, “A Survey on Network Methodologies for Real-Time Analytics of Massive IoT Data and Open Research Issues," IEEE Communications Surveys & Tutorials, 2017
- A. Alrawais, "Fog Computing for the Internet of Things: Security and Privacy Issues," IEEE Internet Computing, vol. 21 (2), pp. 34-42, 2017
- A.K. Pathak, “Security Challenges in Internet of Things (IoT)," International Journals of Advanced Research in Computer Science and Software Engineering, 2017
- C. Sarkar, “DIAT: A scalable distributed architecture for IoT," IEEE Internet of Things Journal, vol. 2(3), pp.230-239, 2015
- K-H. Yeh, “A Secure IoT-Based Healthcare System with Body Sensor Networks," IEEE Access, vol. 4, pp.10288-10299, 2016
- Y-B. Lin, “EasyConnect: A management system for IoT devices and its applications for interactive design and art," IEEE Internet of Things Journal, vol. 2(6), pp.551-561, 2015
- Y. Shi, “An Obfuscatable Aggregatable Signcryption Scheme for Unattended Devices in IoT Systems," IEEE Internet of Things Journal, 2017
- A. Sajid, H. Abbas, and K. Saleem, “Cloud-assisted IoT-based SCADA systems security: A review of the state of the art and future challenges," IEEE Access, vol. 4, pp.1375-1384, 2016
- R. Arshad, “Green IoT: An Investigation on Energy Saving Practices for 2020 and Beyond”, IEEE Access, 2017
- M. Yasin, “Ultra-Low Power, Secure IoT Platform for Predicting Cardiovascular Diseases," IEEE Transactions on Circuits and Systems I: Regular Papers, 2017
- F. Conti, Francesco, “An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics," IEEE Transactions on Circuits and Systems I: Regular Papers, 2017
- S-M. Cheng, “Traffic-aware Patching for Cyber Security in Mobile IoT," arXiv preprint arXiv: 1703.05400, 2017
- S. Koteshwara and A. Das, “Comparative study of Authenticated Encryption targeting lightweight IoT applications," IEEE Design & Test, 2017
- S. Kubler, “Open IoT Ecosystem for Sporting Event Management," IEEE Access, vol. 5, pp.7064-7079, 2017
- D. Kwon, “IoT-based prognostics and systems health management for industrial applications," IEEE Access, vol. 4, pp.3659-3670, 2016.
- C. Hennebert and J.D. Santos, “Security protocols and privacy issues into 6LoWPAN stack: a synthesis”, IEEE Internet of Things Journal, vol.1(5), pp. 384, 2014.
Keywords
Authentication, Actuators, Internet-of-Things, Security, Sensors