IoT: Application Protocols and Security

Full Text (PDF, 426KB), PP.1-8

Views: 0 Downloads: 0

Author(s)

Derek Johnson 1,* Mohammed Ketel 1

1. University of Baltimore, Baltimore, MD, USA

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2019.04.01

Received: 14 Feb. 2019 / Revised: 22 Feb. 2019 / Accepted: 28 Feb. 2019 / Published: 8 Apr. 2019

Index Terms

Internet of Things, Cloud Computing, Security, Privacy, Encryption, Wireless, Mobile

Abstract

The Internet of Things (IoT) commands an ever-growing population of devices across the nation and abroad. The development of privacy concerns and security goals have not kept pace with the demand for new advances in IoT. We will discuss how the IoT currently functions and why the security in this field is important as the technology grows into every device we touch. This paper will also reference current security implementations and how they expect to cover this growing consumer demand for instant data on many devices at once. With IoT devices using less power and smaller processors, there is major discussion in the computing world on what methods succeed. As standard encryption methods are simply too much for small, low power devices to handle; IoT specific security methods should be highlighted.

Cite This Paper

Derek Johnson, Mohammed Ketel, "IoT: Application Protocols and Security", International Journal of Computer Network and Information Security(IJCNIS), Vol.11, No.4, pp.1-8, 2019. DOI:10.5815/ijcnis.2019.04.01

Reference

[1]Cisco Systems, “Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2016-2021,” https://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/mobile-white-paper-c11-520862.html, 2017.
[2]Saurabh Singh, Pradip Kumar Sharma, Seo Yeon Moon, and Jong Hyuk Park, “Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions,” Journal of Ambient Intelligence and Humanized Computing, Springer, 1-18, May 2017.
[3]Francesco Restuccia, Salvatore D’Oro, and Tommaso Melodia, “Securing the Internet of Things: New Perspectives and Research Challenges,” IEEE Internet of Things Journal. Vol. 1, No 1. January 2018.
[4]Ammar Mahmoud, Russello Giovanni, Crispo, Bruno,“Internet of Things: A survey on the security of IoT frameworks,” Journal of Information Security and Applications, Elsevier, 38, 8-27, 2018.
[5]Ala Al-Fuqaha, Mohsen Guizani, Mehdi Mohammadi, Mohammed Aledhari, Moussa Ayyash, “Internet of Things: A Survey on Enabling Technologies, Protocols and Applications,” IEEE Communications Surveys & Tutorials, 2015.
[6]Jatinder Singh, Thomas Pasquier, Jean Bacon, Hajoon Ko, and David Eyers, “Twenty Security Considerations for Cloud-Supported Internet of Things,” IEEE Internet of Things Journal. 269 - 284. 2016.
[7]Stephen Morrow and Colin Bull, “The Internet of Things and Getting Security Right,” https://www.sqs.com/_resources/whitepaper-the-internet-of-things-and-getting-security-right.pdf, 2016.
[8]Ajit A. Chavan and Mininath K. Nighot, “Secure CoAP Using Enhanced DTLS for Internet of Things,” International Journal of Innovative Research in Computer and Communication Engineering, Vol. 2, Issue 12, December 2014.
[9]Amit Pundeer, “Open Source IoT Ecosystem,” White Paper, HCL Engineering and R&D Services. https://www.hcltech.com/white-papers/engineering-and-rd-services/open-source-internet-things-iot-platforms, 2015.
[10]Angelo Capossele, Valerio Cervo, Gianluca De Cicco, and Chiara Petrioli, “Security as a CoAP resource: an optimized DTLS implementation for the IoT,” IEEE International Conference on Communications (ICC), 2015.
[11]Nan Li, Dongxi Liu, and Surya Nepal, “Lightweight Mutual Authentication for IoT and Its Applications,” IEEE Transactions on Sustainable Computing, 2017.
[12]Martin Henze, Lars Hermerschmidt, Daniel Kerpen, Roger H?u?ling, BernhardRumpe, and KlausWehrle, “A comprehensive approach to privacy in the cloud-based Internet of Things,” Future Generation Computer Systems, Elsevier, Volume 56, 701-718, March 2016.
[13]Elisa Bertino, Kim Kwang Raymond Choo, Dimitrios Georgakopolous, and Surya Nepal “Internet of Things (IoT): Smart and Secure Service Delivery,” ACM Transactions on Internet Technology (TOIT) - Special Issue on Internet of Things (IoT): Smart and Secure Service Delivery: Volume 16 Issue 4, December 2016.
[14]Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, and Rajkumar Buyya, “DDoS attacks in cloud computing: issues, taxonomy, and future directions,” Computer Communications, 2017.
[15]Alessio Botta, Walter De Donato, Valerio Persico, and Antonio Pescapé, “Integration of Cloud computing and Internet of Things,” Future Generation Computer Systems, 684 – 700, 2016.