A New Efficient and Secure Architecture Model for Internet of Things

  • Ahmed A. ElngarEmail author
  • Eman K. Elsayed
  • Asmaa A. Ibrahim
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1059)


Internet of Things (IoT) is considered as one of the latest intelligent communication technologies in the world. IoT has been growing in different architectural designs which contributes to the connection between heterogeneous IoT devices. Although, there are many different IoT architectures have been proposed, but they are still suffering from many challenges such as standardization, security, and privacy. This paper will focus on reviewing some existing IoT architectures used to provide security and privacy for IoT networks. Moreover, this paper will introduce a novel IoT security architecture model named IoT-EAA. IoT-EAA tends to satisfy different requirements of IoT security. Hence, the novelty of the proposed IoT-EAA architecture model comes from an important layer called the security layer. This layer employs an external and internal security service against different attacks for each layer within the IoT-EAA architecture model. The proposed architecture model is compared to existing IoT architectures based on several criteria such as security, power and time consumption. Therefore, the proposed IoT-EAA increases security and decrease the power and time consumption, which consider an important contribution to improving the performance of IoT architecture.


Internet of Things (IoT) IoT architecture IoT security Privacy 


  1. 1.
    Farooq MU, Waseem M, Khairi A, Mazhar S (2015) A critical analysis on the security concerns of internet of things (IoT). Int J Comput Appl 111(7)Google Scholar
  2. 2.
    Soumyalatha SGH (2016, May) Study of IoT: understanding IoT architecture, applications, issues and challenges. In: 1st International conference on innovations in computing & networking (ICICN16), CSE, RRCE. Int J Adv Netw ApplGoogle Scholar
  3. 3.
    Rani P, Sri Lakshmi G (2017) IoT vulnerabilities and security. Int J 2:6Google Scholar
  4. 4.
    Aldosari HM (2015) A proposed security layer for the Internet of things communication reference model. Procedia Comput Sci 65:95–98CrossRefGoogle Scholar
  5. 5.
    Bassi A, Bauer M, Fiedler M, Kranenburg RV (2013) Enabling things to talk. Springer-Verlag GmbHGoogle Scholar
  6. 6.
    Liu X, Zhao M, Li S, Zhang F, Trappe W (2017) A security framework for the internet of things in the future internet architecture. Future Internet 9(3):27CrossRefGoogle Scholar
  7. 7.
    Kamel SOM, Hegazi NH (2018) A proposed model of IoT security management system based on a study of internet of things (IoT) security. Int J Sci Eng Res 9(9):1227 ISSN 2229-5518Google Scholar
  8. 8.
    Alhamedi AH, Snasel V, Aldosari HM, Abraham A (2014, July) Internet of things communication reference model. In: 2014 6th International conference on computational aspects of social networks (CASoN). IEEE, pp 61–66Google Scholar
  9. 9.
    Zhang Y (2011, September) Technology framework of the internet of things and its application. In 2011 International conference on electrical and control engineering. IEEE, pp 4109–4112Google Scholar
  10. 10.
    Fremantle P (2014) A reference architecture for the internet of things. WSO2 White paperGoogle Scholar
  11. 11.
    Kim JT (2015) Requirement of security for IoT application based on gateway system. Communications 9(10):201–208CrossRefGoogle Scholar
  12. 12.
    Burmester M, De Medeiros B (2007, April) RFID security: attacks, countermeasures and challenges. In: The 5th RFID academic convocation, the RFID journal conferenceGoogle Scholar
  13. 13.
    Mitrokotsa A, Rieback MR, Tanenbaum AS (2010) Classification of RFID attacks. Gen 15693:14443Google Scholar
  14. 14.
    Li L (2012, May) Study on security architecture in the Internet of Things. In: Proceedings of 2012 international conference on measurement, information and control, vol 1. IEEE, pp 374–377Google Scholar
  15. 15.
    Douceur JR (2002, March) The sybil attack. In: International workshop on peer-to-peer systems. Springer, Berlin, Heidelberg, pp 251–260CrossRefGoogle Scholar
  16. 16.
    Ahmed N, Kanhere SS, Jha S (2005) The holes problem in wireless sensor networks: a survey. ACM SIGMOBILE. Mobile Computing and Communications Review 9(2): 4–18CrossRefGoogle Scholar
  17. 16.
    Bhattasali T, Chaki R, Sanyal S (2012) Sleep deprivation attack detection in wireless sensor network. arXiv preprint arXiv:1203.0231
  18. 17.
    Padmavathi DG, Shanmugapriya M (2009) A survey of attacks, security mechanisms and challenges in wireless sensor networks. arXiv preprint arXiv:0909.0576
  19. 18.
    Fulare PS, Chavhan N (2011) False data detection in wireless sensor network with secure communication. Int J Smart Sens Ad Hoc Netw (IJSSAN) 1(1):66–71Google Scholar
  20. 19.
    Farooq MU, Waseem M, Khairi A, Mazhar S (2015) A critical analysis on the security concerns of internet of things (IoT). Int J Comput Appl 111(7)Google Scholar
  21. 20.
    Padhy RP, Patra MR, Satapathy SC (2011) Cloud computing: security issues and research challenges. Int J Comput Sci Inf Technol Secur (IJCSITS) 1.2:136–146Google Scholar
  22. 21.
    Thakur BS, Chaudhary S (2013) Content sniffing attack detection in client and server side: a survey. Int J Adv Comput Res 3(2):7Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Ahmed A. Elngar
    • 1
    Email author
  • Eman K. Elsayed
    • 2
  • Asmaa A. Ibrahim
    • 2
  1. 1.Faculty of Computers and Artificial IntelligenceBeni-Suef UniversityBeni Suef CityEgypt
  2. 2.Faculty of ScienceAl-Azhar UniversityNasr City, CairoEgypt

Personalised recommendations