Abstract
In this digital era of IoT data storing and management is not a big issue however protecting of information and applying strong security on data is a major issue. The security issue and challenges in the Internet of things are directly linked to the large application of IoT system. This chapter starts with the introduction of IoT statistics, some IoT application domaina architecture, and feature of IoT safety. This chapter presents quite a few safety challenges and issues of IoT that live in the layered IoT architecture. In IoT data acquisition each IoT object that gathers information is a precious benefit. It is necessary to make sure that devices cannot disclose data to unauthorized users or parties. Thus the safety measures as well as major security challenges are concerned at all there layer in IoT architecture ithat is iphysical layer, network layer, and application layer.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Gaikwad, P.P., Gabhane, J.P., Golait, S.S.: A survey based on Smart Homes system using Internet-of-Things. In: 2015 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC) (pp. 0330-0335). IEEE (2015)
Mahalle, P.N., Anggorojati, B., Prasad, N.R., Prasad, R.: Identity authentication and capability based access control (iacac) for the internet of things. J. Cyber Secur. Mob. 1(4), 309–348 (2013)
Padmavathi, D.G., Shanmugapriya, M.: A survey of attacks, security mechanisms and challenges in wireless sensor networks (2009). arXiv preprint arXiv:0909.0576
Liu, L.A., Lai, S.L.: ALOHA-based anti-collision algorithms used in RFID system. In: Proceedings of the IEEE International Conference on Networking and Mobile Computing, pp. 1–4, 2006
Atzori, L., Iera, A., Morabito, G., Nitti, M.: The social internet of things (siot)–when social networks meet the internet of things: concept, architecture and network characterization. Comput. Netw. 56(16), 3594–3608 (2012)
Zhao, K., Ge, L.: A survey on the internet of things security. In: 2013 Ninth International Conference on Computational Intelligence and Security, pp. 663–667. IEEE (2013)
Da Xu, L., He, W., Li, S.: Internet of things in industries: a survey. IEEE Trans. Ind. Inf. 10(4), 2233–2243 (2014)
Ali, M., Ali, R., Khan, W.A., Han, S.C., Bang, J., Hur, T., Kang, B.H.: A data-driven knowledge acquisition system: An end-to-end knowledge engineering process for generating production rules. IEEE Access 6, 15587–15607 (2018)
Soni, M., Kumar, K., Sharma, A.: A review on security and privacy in application of IOT in Smart City (2018)
Qiang, C., Quan, G.R., Yu, B., Yang, L.: Research on security issues of the internet of things. Int. J. Fut. Gen. Commun. Netw. 6(6), 1–10 (2013)
Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., Zhao, W.: A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 4(5), 1125–1142 (2017)
Mukaddam, A., Elhajj, I., Kayssi, A., Chehab, A.: Ip spoofing detection using modifiehop count. In: Proceedings of 2014 IEEE 28th International Conference on Advanced Information Networking and Applications, May 2014
Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.: Social phishing. Commun. ACM 50(10), 94–100 (2007)
Bhupendra Singh, T., Chaudhary, S.: Content sniffing attack detection in client and server side: a survey. Int. J. Adv. Comput. Res. 3(2) (2013)
Qu, J., Athanasios, V., Jiafu, W., Jingwei, L., Dechao, Q..: Security of the Internet of Things: perspectives and challenges. Published online: 17 June 2014 Springer Science+Business Media New York 2014.
Maleh, Y., Ezzati, A.: A review of security attacks and intrusion detection schemes in wireless sensor networks. Int. J. Wirel. Mobile Netw. (IJWMN) 5(6) (2013)
Benjamin, K.: RFID as an enabler of the internet of things: issues of security and privacy. In: IEEE International Conferences on Internet of Things, and Cyber, Physical and Social Computing, 2011.
Li, L.: Study on security architecture in the Internet of Things. In: Doyle, W.D.: (eds.) International Conference on Measurement, Information and Control (MIC), 2012 “Magnetization Reversal in Films with Biaxial Anisotropy, in 1987 Proceedings of the INTERMAG Conference, pp. 2.2-1–2.2-6
Ravindran, R., Yomas, J., Jubin Sebastian, E.: IoT: a review on security issues and measures. IRACST: Eng. Sci. Technol.: Int. J. (ESTIJ) 5(6) (2015). ISSN:2250-3498
Aminesh, P., Park, J.M.: An overview of anomaly detection techniques: Existing solutions and latest technological trends. Comput. Netw. 51(2) (2007)
Abbasi, M.A., Memon, Z.A., Memon, J., Syed, T.Q., Alshboul, R.: Addressing the future data management challenges in iot: A proposed framework. Int. J. Adv. Comput. Sci. Appl. 8(5), 197–207 (2017)
Ahmed, N., Kanhere, S.S., Jha, S.: The holes problem in wireless sensor networks: a survey. ACM Sigmobile Mobile Comput. Commun. Rev. 9(2), 4–18 (2005)
Andrea, I., Chrysostomou, C., Hadjichristofi, G.: Internet of Things: Security vulnerabilities and challenges. In: 2015 IEEE Symposium on Computers and Communication (ISCC), pp. 180–187. IEEE (2015)
Wang, X., Yu, W., Champion, A., Fu, X., Xuan, D.: Detecting worms via mining dynamic program execution. In: Proceedings of Third International Conference on Security and Privacy in Communications Networks, 2007
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Pise, G.S., Babar, S.D. (2021). Data Acquisition and Knowledge Management in IoT: Security Issues, Challenges, and Road Map Ahead. In: Mahalle, P.N., Shinde, G.R., Dey, N., Hassanien, A.E. (eds) Security Issues and Privacy Threats in Smart Ubiquitous Computing. Studies in Systems, Decision and Control, vol 341. Springer, Singapore. https://doi.org/10.1007/978-981-33-4996-4_5
Download citation
DOI: https://doi.org/10.1007/978-981-33-4996-4_5
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-33-4995-7
Online ISBN: 978-981-33-4996-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)