Work-in-Progress: Challenges in IoT Security

  • Sreelatha MalempatiEmail author
  • V. S. J. R. K. PadminivalliEmail author
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 80)


Many IoT devices lack basic security requirements. The small size and limited processing power of many connected devices could inhibit encryption and other robust security measures. People need understanding of limitations of devices due to their size and the approaches for providing security. The challenges for implementing the security of embedded devices and providing end-to-end security are the outcomes of this study.


Internet of Things IoT security Embedded devices Hardware security 


  1. 1.
    De Poorter, E., Moerman, I., Demeester, P.: Enabling direct connectivity between heterogeneous objects in the internet of things through a network-service-oriented architecture. EURASIP J. Wirel. Commun. Netw. (2011)Google Scholar
  2. 2.
    Kulkarni, S., Kulkarni, S.: Communication models in internet of things: a survey. Int. J. Sci. Technol. Eng. 3(11), 88–91 (2017)Google Scholar
  3. 3.
    Bello, O., Zeadally, S.: Intelligent device-to-device communication in the internet-of-things. IEEE J., pp 1172–1182 (2016)CrossRefGoogle Scholar
  4. 4.
    Biswas, A.R., Giaffrede, R.: IoT and cloud convergence. In: IEEE World Forum on Internet of Things (2014)Google Scholar
  5. 5.
    Altamimi, A.B., Ramadan, R.A.: Towards internet of things modelling: a gateway approach. Complex Adapt. Syst. Model. (2016)Google Scholar
  6. 6.
    Ezema, E., Abdullah, A., Sani, N.F.M.: A Comprehensive survey of security related challenges in internet of things. Int. J. New Comput. Archit. Their Appl. 8(3), 160–167 (2018)CrossRefGoogle Scholar
  7. 7.
    Yoon, S., Kim, J.: Remote security management server for IoT devices. In: International Conference on Information Communication Technology Convergence, Jeju, South Korea (2017)Google Scholar
  8. 8.
    Oh, S., Kim, Y.: Development of IoT security component for interoperability. In: 13th International Computer Engineering Conference, Ciaro Egypt (2017)Google Scholar
  9. 9.
    Suresh Babu, G.N.K., Kumaraswamy, M.: Security considerations for IoT technologies. Int. J. Adv. Eng. Res. Dev. 5(4), 1592–1599 (2018)Google Scholar
  10. 10.
    Tiburski, R.T., Amaral, L.A., de Matos, E., de Azevedo, D.F.G., Hessel, F.: The role of lightweight approaches towards the standardization of a security architecture for IoT middleware systems. IEEE Commun. Mag. 54(34), 56–62 (2016)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Computer Science & EngineeringR.V.R & J.C. College of EngineeringGunturIndia

Personalised recommendations