INFORMATION CHANGE THE WORLD

International Journal of Education and Management Engineering(IJEME)

ISSN: 2305-3623 (Print), ISSN: 2305-8463 (Online)

Published By: MECS Press

IJEME Vol.7, No.2, Mar. 2017

Protocols for Secure Internet of Things

Full Text (PDF, 436KB), PP.20-29


Views:84   Downloads:9

Author(s)

Azka, S Revathi

Index Terms

Internet of Things (IoT);DTLS;COAP;IPSec;MQTT;SDN

Abstract

Internet of Things has become a buzzword. It refers to networking of simplest mundane objects not just for human to machine or human to human interactions but for independent thing to thing interaction as well. Such interconnected or smart environment can do wonders but at the same time poses numerous threats to human lives. The ordinary and less powerful objects from day to day life are holding sensitive and private data from humans and trying to transport that through the insecure world of Internet. This new phase of Internet or Internet of Things (IoT) is yet in its infancy and does not have a security support mechanism of its own. The Internet and World Wide Web deal with interconnection of powerful devices like computers or smart phones and are well supported by standard Internet protocols ensuring optimum security and protection. The lightweight versions of the existing Internet protocols are backing the operations of IoT to a large extent but the security needs are not met completely as of yet. Many research organizations and individual researchers are working to make existing protocols and infrastructure applicable in IoT. This paper highlights the threats posed by uncontrolled proliferation of Internet of things and discusses major protocols that have been or that are being designed to overcome the security issues raised by Internet of things.

Cite This Paper

Azka, S Revathi,"Protocols for Secure Internet of Things", International Journal of Education and Management Engineering(IJEME), Vol.7, No.2, pp.20-29, 2017.DOI: 10.5815/ijeme.2017.02.03

Reference

[1]R. Roman, J. Zhou, J. Lopez, "On the features and challenges of security and privacy in distributed internet of things", Computer Networks, Elsevier Vol. 57, pp. 2266–2279, 2014

[2]Sye Loong Keoh, Sandeep S. Kumar, and Hannes Tschofenig, "Securing the Internet of Things: A Standardization Perspective," IEEE Internet of Things Journal, vol. 1, no. 3, pp. 265-275, June 2014. 

[3]Kim Thuat Nguyen, Maryline Laurent, Nouha Oualha, "Survey on secure communication protocols for the Internetof Things," Ad Hoc Networks Journal, vol. 32, pp. 17–31, 2015. 

[4]Chakib Bekara, "Security Issues and Challenges for the IoT-based Smart Grid," Procedia Computer Science, vol. 34, pp.532 – 537, 2014

[5]N. Kushalnagar, G. Montenegro, and C. Schumacher, "IPv6 over low-power wireless personal area networks (6LoWPANs): Overview, assumptions, problem statement, and goals," RFC 4919, Aug. 2007.

[6]T. Winter et al., "RPL: IPv6 routing protocol for low-power and lossynetworks," RFC 6550 (Proposed Standard), Mar. 2012. 

[7]Z. Shelby, K. Hartke, and C. Bormann, "Constrained application protocol (CoAP)," draft-ietf-core-coap-18, IETF, 2013. 

[8]René Hummen, Jan H. Ziegeldorf, Hossein Shafagh, Shahid Raza, Klaus Wehrle," Towards Viable Certificate-based Authenticationfor the Internet of Things," ACM 978-1-4503-2003, April 19, 2013

[9]Tobias Heer, Oscar Garcia-Morchon, René Hummen, Sye Loong Keoh, Sandeep S. Kumar, Klaus Wehrle, "Security Challenges in the IP-based Internet of Things," Wireless Pers Commun Journal, vol. 61, pp.527–542, 2011

[10]Z. Shelby, K. Hartke, and C. Bormann, "Constrained application protocol (CoAP)," draft-ietf-core-coap-18, IETF, 2013. 

[11]http://www.cisco.com/c/en/us/about/security-center/secure-iot-proposed-framework.html.

[12]http://www.standardsuniversity.org/e-magazine/march-2016/iot-security-news-and-further-reading/

[13]http://www.standardsuniversity.org/e-magazine/march-2016/iot-security-standards-paving-the-way-for-customer-confidence/

[14]Mukul Panwar, Ajay Kumar, "Security for IoT An effective DTLS with public certificates," IEEE-ICACEA, pp-163-166, March 2015. 

[15]https://tools.ietf.org/html/rfc4347

[16]Thomas Kothmayr, Corinna Schmitt, Wen Hu, Michael Brünig, Georg Carle, "DTLS based security and two-way authentication for the Internet of Things," Ad Hoc Networks Journal vol. 11, pp. 2710–2723, 2013. 

[17]https://tools.ietf.org/html/rfc4301

[18]Qi Jing, Athanasios V. Vasilakos, Jiafu Wan, Jingwei Lu, Dechao Qiu,"Security of the Internet of Things: perspectives and challenges" Wireless Networks, Springer, Vol-20,Issue-8, pp 2481-2501, November 2014.

[19]IETF, "Diet-IPsec (IPSECME) WG,"2014. 

[20]http://www.cse.wustl.edu/~jain/cse574-14/ftp/coap

[21]Shahid Raza, Hossein Shafagh, Kasun Hewage, René Hummen, and Thiemo Voigt, "Lithe: Lightweight Secure CoAP for the Internet of Things," IEEE Sensors Journal, VOL. 13, NO. 10, pp. 3711- 3720, October 2013.

[22]Jongmoon Park, Myung-Joon Lee, "A Smart Context Distribution Framework Based on a Messaging Service for the Internet of Things", Journal of Applied Mathematics, Hindawi, Vol-2014, Article ID 271817, 2014.