Skip to main content

Internet of Things (IoT) for Secure Data and M2M Communications—A Study

  • Conference paper
  • First Online:
Computational Methods and Data Engineering

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 139))

  • 403 Accesses

Abstract

At present, the IoT has received huge amount of research considerations. The IoT is acknowledged by payless progression of information among numerous low-power embedded gadgets which utilize the Internet for interacting among others. It is anticipated that the IoT would be generally conveyed and would identify relevance in various fields of life. Requirements for IoT have recently taken in enormous attention, and connections are amped up for the trading probabilities of the information which would be created by deploying those systems. Despite what may be thought of, IoT has various protection and security worries for the last customers which limit its expansion. Because of the billions of associated gadgets, there is an incredible danger of personality and information burglary, gadget control, information manipulations, network or server alterations, and ensuing effect on application stages. Security is one of foremost innovative research-based issues that is available at present for IoT. The security contains numerous aspects—security worked inside the gadget, security of information transmissions, and information stockpiling inside the frameworks and its application. In the work done here, we have distinguished, categorized, and examined numerous security issues and best in class endeavors to determine these difficulties. The arrangement of effective security and protection conventions in IoT systems is incredibly expected to guarantee secrecy, verification, access control, and honesty, among others.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Z Yan P Zhang A Vasilakos 2014 A survey on trust management for Internet of Things J Netw Comput Appl 42 120 134

    Article  Google Scholar 

  2. Granjal J, Monteiro E, Sa Silva J (2015) Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun Surv Tutor 17:1294–1312

    Google Scholar 

  3. Ambrosin M et al (2016) On the feasibility of attribute-based encryption on internet of things devices. IEEE Micro 36(6):25–35. https://doi.org/10.1109/MM.2016.101

  4. Kharchenko V, Kolisnyk M, Piskachova I, Bardis N (2016) Reliability and security issues for IoT-based smart business center: architecture and Markov model. In: 2016 third international conference on mathematics and computers in sciences and in industry (MCSI), Chania, pp 313–318

    Google Scholar 

  5. Kumar JS, Patel DR (2014) A survey on internet of things: security and privacy issues. Int J Comput Appl 90(11)

    Google Scholar 

  6. Abomhara M, Køien GM (2014) Security and privacy in the internet of things: current status and open issues. In: International conference on privacy and security in mobile systems (PRISMS). IEEE, pp 1–8

    Google Scholar 

  7. L Atzori A Iera G Morabito 2010 The internet of things: a survey Comput Netw 54 15 2787 2805

    Article  Google Scholar 

  8. Hossain MM, Fotouhi M, Hasan R (2015) Towards an analysis of security issues, challenges, and open problems in the internet of things. In: 2015 IEEE world congress on services (SERVICES). IEEE, pp 21–28

    Google Scholar 

  9. Khodadadi F, Calheiros RN, Buyya R (2015) A data-centric framework for development and deployment of internet of things applications in clouds. In: 2015 IEEE tenth international conference on intelligent sensors, sensor networks and information processing (ISSNIP). IEEE

    Google Scholar 

  10. R Roman J Zhou J Lopez 2013 On the features and challenges of security and privacy in distributed internet of things Comput Netw 57 10 2266 2279

    Article  Google Scholar 

  11. Sicari S et al (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76:146–164

    Google Scholar 

  12. Garcia-Morchon O, Keoh SL, Kumar S, Moreno-Sanchez P, Vidal-Meca F, Ziegeldorf JH (2013) Securing the IP based internet of things with HIP and DTLS. In: Proceedings of sixth ACM conference on security and privacy in wireless and mobile networks, Budapest, Hungary

    Google Scholar 

  13. A Samani HH Ghenniwa A Wahaishi 2015 Privacy in Internet of things: a model and protection framework Proc Comput Sci 52 606 613

    Article  Google Scholar 

  14. Schurgot MR, Shinberg DA, Greenwald LG (2015) Experiments with security and privacy in IoT networks. In: Proceedings of IEEE world of wireless, mobile and multimedia networks (WoWMoM), Boston, MA

    Google Scholar 

  15. J Morrish 2014 Business models for machine-to-machine (M2M) communications C Anton-Haro M Dohler Eds Machine-to-machine (M2M) communications: architecture, performance and applications Wood head Publishing Oxford 339 353

    Google Scholar 

  16. Maple C (2017) Security and privacy in the internet of things. ABI Research 155–184, Published online: 24 Aug 2017

    Google Scholar 

  17. P Buxmann T Hess R Ruggaber 2011 Internet of services Bus Inf Syst Eng 1 5 341 342

    Article  Google Scholar 

  18. Sadeghi A-R, Wachsmann C, Waidner M (2015) Security and privacy challenges in industrial internet of things. In: 52nd ACM/EDAC/IEEE design automation conference, San Francisco, CA, June 8–10. ACM Press, New York, pp 1–6

    Google Scholar 

  19. Gerla M, Lee E-K, Pau G, Lee U (2014) Internet of vehicles: from intelligent grid to autonomous cars and vehicular clouds. In: 2014 IEEE world forum on internet of things (WF-IoT), 12(9):241–246. Seoul, Korea, March 6–8

    Google Scholar 

  20. Smith D, Lyle S, Berry A, Manning N, Zaki M, Neely A (2015) Internet of animal health things (IoAHT) opportunities and challenges. University of Cambridge

    Google Scholar 

  21. Ahmed SST, Thanuja K, Guptha NS, Narasimha S (2016) Telemedicine approach for remote patient monitoring system using smart phones with an economical hardware kit. In: 2016 international conference on computing technologies and intelligent data engineering (ICCTIDE’16). IEEE, pp 1–4

    Google Scholar 

  22. Ahmed SST, Sandhya M, Shankar S, ICT’s role in building and understanding Indian telemedicine environment: a study. In: Information and communication technology for competitive strategies. Springer, pp 391–397

    Google Scholar 

  23. Bojanova I, Hurlburt G, Voas J (2014) Imagineering an internet of anything. Computer 47(6):72–77. https://doi.org/10.1109/MC.2014.150

  24. Kumar SS, Ahmed ST, Vigneshwaran P, Sandeep H, Manjunath Singh H (2021) Two phase cluster validation approach towards measuring cluster quality in unstructured and structured numerical datasets. J Ambient Intel Human Comput 12(7):7581–7594

    Google Scholar 

  25. Gubbi J et al (2013) Internet of things (IoT): a vision, architectural elements, and future directions. Future Gen Comput Syst 29(7):1645–1660

    Google Scholar 

  26. Al-Fuqaha A et al (2015) Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutor 17(4):2347–2376

    Google Scholar 

  27. Chen C-M et al (2012) RCDA: recoverable concealed data aggregation for data integrity in wireless sensor networks. IEEE Trans Parallel Distrib Syst 23(4):727–734

    Google Scholar 

  28. S Chen H Xu D Liu B Hu H Wang 2014 A vision of iot: applications, challenges, and opportunities with china perspective IEEE Internet Things J 1 4 349 359

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. Shashikala .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shashikala, N., Mundada, M.R. (2023). Internet of Things (IoT) for Secure Data and M2M Communications—A Study. In: Asari, V.K., Singh, V., Rajasekaran, R., Patel, R.B. (eds) Computational Methods and Data Engineering. Lecture Notes on Data Engineering and Communications Technologies, vol 139. Springer, Singapore. https://doi.org/10.1007/978-981-19-3015-7_2

Download citation

Publish with us

Policies and ethics