Skip to main content

IoT Sensor Networks Security Mechanisms/Techniques

  • Chapter
  • First Online:
Green Internet of Things Sensor Networks

Abstract

In recent years, several efforts have been made by many researchers to emphasize security issues in the IoT sensor network framework. It is evident from prior research that the area of security and privacy has caught the attention of many researchers. Although the focus of this chapter is to review recent research techniques and mechanisms to ensure IoT security, some related works do not exclusively focus on security areas such as security and privacy issues, and their solutions, in the IoT system architecture. This work aims to unearth research opportunities to address security issues and challenges. The contribution of this work focuses on providing a layered approach to propose solutions to layer security challenges using emerging technologies for securing sensor networks through mechanisms such as lightweight encryption, authentication trust recommendation, and secure cloud computing. The work presents recent trends in current research on securing IoT communication and applications concerning the IoT architecture. The study further gives insights on the need for convergence with several interdisciplinary technologies to improve the security of IoT through opportunities such as blockchain, machine learning, and the development of context-aware applications, IoP and IoE should be further investigated to review real-life examples and analysis of their effectiveness towards enhancing privacy and security in wireless IoT sensor networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 159.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, M. Ayyash, Internet of Things: A survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutorials 17(4) (2015). https://doi.org/10.1109/COMST.2015.2444095

  2. J. Granjal, E. Monteiro, J.S. Silva, Security for the Internet of things: A survey of existing protocols and open research issues. IEEE Commun. Surv. Tutorials 17(3), 1294–1312 (2015). https://doi.org/10.1109/COMST.2015.2388550

    Article  Google Scholar 

  3. S. Nisha and M. Farik, RSA public key cryptography algorithm-a review. Int. J. Sci. Technol. Res. 6(7) (2017) [Online]. Available: www.ijstr.org.

  4. M.A. Ferrag, L.A. Maglaras, H. Janicke, J. Jiang, L. Shu, Authentication protocols for Internet of things: A comprehensive survey. Secur. Commun. Networks 2017 (2017). https://doi.org/10.1155/2017/6562953

  5. S. Madakam, R. Ramaswamy, S. Tripathi, Jcc_2015052516013923. J. Comput. Commun. 2015, 164–173 (2015). https://doi.org/10.4236/jcc.2015.35021

    Article  Google Scholar 

  6. I. Ali, S. Sabir, Z. Ullah, Internet of things security, device authentication and access control: A review. 14(8), 456–466 (2019) [Online]. Available: http://arxiv.org/abs/1901.07309.

  7. A. Tewari, B.B. Gupta, Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework. Futur. Gener. Comput. Syst. (2018). https://doi.org/10.1016/j.future.2018.04.027

  8. J. Deogirikar, A. Vidhate, Security attacks in IoT: A survey. Proc. Int. Conf. IoT Soc. Mobile, Anal. Cloud, I-SMAC 2017, 32–37 (2017). https://doi.org/10.1109/I-SMAC.2017.8058363

    Article  Google Scholar 

  9. A.A.A. Ari et al., Enabling privacy and security in Cloud of Things: Architecture, applications, security & privacy challenges. Appl. Comput. Informatics (2019). https://doi.org/10.1016/j.aci.2019.11.005

  10. M. Pirretti, S. Zhu, N. Vijaykrishnan, P. McDaniel, M. Kandemir, R. Brooks, The sleep deprivation attack in sensor networks: Analysis and methods of defense. Int. J. Distrib. Sens. Networks 2(3), 267–287 (2006). https://doi.org/10.1080/15501320600642718

    Article  Google Scholar 

  11. V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal, B. Sikdar, A survey on IoT security: Application areas, security threats, and solution architectures. IEEE Access 7, 82721–82743 (2019). https://doi.org/10.1109/ACCESS.2019.2924045

    Article  Google Scholar 

  12. B.B. Zarpelão, R.S. Miani, C.T. Kawakani, S.C. de Alvarenga, A survey of intrusion detection in Internet of Things. J. Netw. Comput. Appl. 84, 25–37 (2017). https://doi.org/10.1016/j.jnca.2017.02.009

    Article  Google Scholar 

  13. K. Chen et al., Internet-of-Things security and vulnerabilities: Taxonomy, challenges, and practice. J. Hardw. Syst. Secur. 2(2), 97–110 (2018). https://doi.org/10.1007/s41635-017-0029-7

    Article  Google Scholar 

  14. X. Li, J. Xu, H.N. Dai, Q. Zhao, C.F. Cheang, Q. Wang, On modeling eavesdropping attacks in wireless networks. J. Comput. Sci. 11, 196–204 (2015). https://doi.org/10.1016/j.jocs.2014.10.006

    Article  MathSciNet  Google Scholar 

  15. D. Sopori, T. Pawar, M. Patil, R. Ravindran, Internet of Things: Security threats. Ijarcet.Org 6(3), 263–267 (2017) [Online]. Available: http://ijarcet.org/wp-content/uploads/IJARCET-VOL-6-ISSUE-3-263-267.pdf.

  16. K. Somasundaram, K. Selvam, IOT – attacks and challenges. Int. J. Eng. Tech. Res. 8(9), 9–12 (2018). https://doi.org/10.31873/ijetr.8.9.67

    Article  Google Scholar 

  17. G. Glissa, A. Rachedi, A. Meddeb, A secure routing protocol based on RPL for internet of things, in 2016 IEEE Glob. Commun. Conf. GLOBECOM 2016 - Proc., (2016), pp. 1–7. https://doi.org/10.1109/GLOCOM.2016.7841543

    Chapter  Google Scholar 

  18. M. Bouabdellah, N. Kaabouch, F. El Bouanani, H. Ben-Azza, Network layer attacks and countermeasures in cognitive radio networks: A survey. J. Inf. Secur. Appl. 38, 40–49 (2018). https://doi.org/10.1016/j.jisa.2017.11.010

    Article  Google Scholar 

  19. I. Stojmenovic, S. Wen, The fog computing paradigm: Scenarios and security issues. Proc. 2014 Fed. Conf. Comput. Sci. Inf. Syst. 2, 1–8 (2014). https://doi.org/10.15439/2014f503

    Article  Google Scholar 

  20. S. Subashini, V. Kavitha, A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011). https://doi.org/10.1016/j.jnca.2010.07.006

    Article  Google Scholar 

  21. S. Al Jadaani, M. Al Maliki, W. Al Ghamdi, M. Hemalatha, Security issues in cloud computing. Int. J. Appl. Eng. Res. 11(12), 7669–7671 (2016). https://doi.org/10.5120/6369-8736

    Article  Google Scholar 

  22. R. Mahmoud, T. Yousuf, F. Aloul, I. Zualkernan, Internet of Things (IoT) Security: Current status, challenges and prospective measures, in 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), (IEEE, London, 2015)

    Google Scholar 

  23. V. Beltran, A.F. Skarmeta, An overview on delegated authorization for CoAP: Authentication and authorization for Constrained Environments (ACE), in 2016 IEEE 3rd World Forum Internet Things, WF-IoT 2016, (2017), pp. 706–710. https://doi.org/10.1109/WF-IoT.2016.7845482

    Chapter  Google Scholar 

  24. P. Nespoli, M. Zago, A.H. Celdran, M.G. Perez, F.G. Marmol, F.J. Garcia Clernente, A dynamic continuous authentication framework in IoT-enabled environments, in 2018 5th Int. Conf. Internet Things Syst. Manag. Secur. IoTSMS 2018, (2018), pp. 131–138. https://doi.org/10.1109/IoTSMS.2018.8554389

    Chapter  Google Scholar 

  25. M. El-Hajj, M. Chamoun, A. Fadlallah, A. Serhrouchni, Analysis of authentication techniques in Internet of Things (IoT), in 2017 1st Cyber Secur. Netw. Conf. CSNet 2017, vol. 2017, (2017), pp. 1–3. https://doi.org/10.1109/CSNET.2017.8242006

    Chapter  Google Scholar 

  26. N. Tapas, G. Merlino, F. Longo, Blockchain-Based IoT-cloud authorization and delegation, in Proc. – 2018 IEEE Int. Conf. Smart Comput. SMARTCOMP 2018, (2018), pp. 411–416. https://doi.org/10.1109/SMARTCOMP.2018.00038

    Chapter  Google Scholar 

  27. Z.A. Alizai, N.F. Tareen, I. Jadoon, Improved IoT device authentication scheme using device capability and digital signatures, in ICAEM 2018 – 2018 Int. Conf. Appl. Eng. Math. Proc., (2018), pp. 115–119. https://doi.org/10.1109/ICAEM.2018.8536261

    Chapter  Google Scholar 

  28. J.H. Han, J.N. Kim, A lightweight authentication mechanism between IoT devices, in Int. Conf. Inf. Commun. Technol. Converg. ICT Converg. Technol. Lead. Fourth Ind. Revolution, ICTC 2017, vol. 2017, (2017), pp. 1153–1155. https://doi.org/10.1109/ICTC.2017.8190883

    Chapter  Google Scholar 

  29. P. Musale, D. Baek, B.J. Choi, Lightweight gait based authentication technique for IoT using subconscious level activities, in IEEE World Forum Internet Things, WF-IoT 2018 – Proc., vol. 2018, (2018), pp. 564–567. https://doi.org/10.1109/WF-IoT.2018.8355210

    Chapter  Google Scholar 

  30. P. Hao, X. Wang, W. Shen, A collaborative PHY-aided technique for end-to-end IoT device authentication. IEEE Access 6, 42279–42293 (2018). https://doi.org/10.1109/ACCESS.2018.2859781

    Article  Google Scholar 

  31. T. Shah, S. Venkatesan, Authentication of IoT device and IoT server using secure vaults, in Proc. – 17th IEEE Int. Conf. Trust. Secur. Priv. Comput. Commun. 12th IEEE Int. Conf. Big Data Sci. Eng. Trust. 2018, (2018), pp. 819–824. https://doi.org/10.1109/TrustCom/BigDataSE.2018.00117

    Chapter  Google Scholar 

  32. N. Abbas, Y. Zhang, A. Taherkordi, T. Skeie, Mobile edge computing: A survey. IEEE Internet Things J. 5(1), 450–465 (2018). https://doi.org/10.1109/JIOT.2017.2750180

    Article  Google Scholar 

  33. Y. Lu, Industry 4.0: A survey on technologies, applications and open research issues. J. Ind. Inf. Integr. 6, 1–10 (2017). https://doi.org/10.1016/j.jii.2017.04.005

    Article  Google Scholar 

  34. R. Jinnai, A. Inomata, I. Arai, K. Fujikawa, Proposal of hardware device model for IoT endpoint security and its implementation, in 2017 IEEE Int. Conf. Pervasive Comput. Commun. Work. PerCom Work. 2017, (2017), pp. 91–93. https://doi.org/10.1109/PERCOMW.2017.7917533

    Chapter  Google Scholar 

  35. F. Rahman, M. Farmani, M. Tehranipoor, Y. Jin, Hardware-assisted cybersecurity for IoT devices, in 2017 18th Int. Work. Microprocess. SOC Test Verif., (2017), pp. 51–56. https://doi.org/10.1109/MTV.2017.16

    Chapter  Google Scholar 

  36. F. Bruguier, P. Benoit, L. Torres, L. Bossuet, Hardware security: From concept to application, in 2016 11th Eur. Work. Microelectron. Educ. EWME 2016, (2016), pp. 1–6. https://doi.org/10.1109/EWME.2016.7496483

    Chapter  Google Scholar 

  37. K. Sudeendra Kumar, S. Sahoo, A. Mahapatra, A.K. Swain, K.K. Mahapatra, Security enhancements to system on chip devices for IoT perception layer, in Proc. – 2017 IEEE Int. Symp. Nanoelectron. Inf. Syst. iNIS 2017, vol. 2018, (2018), pp. 151–156. https://doi.org/10.1109/iNIS.2017.39

    Chapter  Google Scholar 

  38. L. Xiao, X. Wan, X. Lu, Y. Zhang, D. Wu, IoT security techniques based on machine learning: How do iot devices use AI to enhance security? IEEE Signal Process. Mag. 35(5), 41–49 (2018). https://doi.org/10.1109/MSP.2018.2825478

    Article  Google Scholar 

  39. R. Tripathi, S. Agrawal, Comparative study of symmetric and asymmetric cryptography. Int. J. Adv. Found. Res. Comput. 1 (6), 68–76 (2014) [Online]. Available: https://pdfs.semanticscholar.org/e0e4/810c5276f9c05cc82425fcf911f206c52bef.pdf.

  40. N. Alsaffar, W. Elmedany, H. Ali, Application of RC5 for IoT devices in smart transportation system, in 2019 8th Int. Conf. Model. Simul. Appl. Optim. ICMSAO 2019, (2019), pp. 1–4. https://doi.org/10.1109/ICMSAO.2019.8880351

    Chapter  Google Scholar 

  41. D. Mendez, I. Papapanagiotou, B. Yang, Internet of Things: Survey on Security and Privacy. pp. 1–16, 2020.

    Google Scholar 

  42. T.K. Goyal, V. Sahula, Lightweight security algorithm for low power IoT devices, in 2016 Int. Conf. Adv. Comput. Commun. Informatics, ICACCI 2016, (2016), pp. 1725–1729. https://doi.org/10.1109/ICACCI.2016.7732296

    Chapter  Google Scholar 

  43. Y. Xiao, G. Gao, An independent individual certification scheme based on digital watermark in WSNs, in Proc. – 2019 IEEE Int. Conf. Smart Internet Things, SmartIoT 2019, (2019), pp. 474–478. https://doi.org/10.1109/SmartIoT.2019.00086

    Chapter  Google Scholar 

  44. I. Ud Din et al., The Internet of Things: A review of enabled technologies and future challenges. IEEE Access 7, 7606–7640 (2019). https://doi.org/10.1109/ACCESS.2018.2886601

    Article  Google Scholar 

  45. R. van der Meulen, Gartner says 8.4 billion connected ‘Things’ will be in use in 2017, up 31 percent from 2016. Gartner (2017) https://www.gartner.com/en/newsroom/press-releases/2017-02-07-gartner-says-8-billion-connected-things-will-be-in-use-in-2017-up-31-percent-from-2016. Accessed 20 July 2019

  46. J. Karlsson, L.S. Dooley, G. Pulkkis, Secure routing for MANET connected Internet of things systems, in Proc. – 2018 IEEE 6th Int. Conf. Futur. Internet Things Cloud, FiCloud 2018, (2018), pp. 114–119. https://doi.org/10.1109/FiCloud.2018.00024

    Chapter  Google Scholar 

  47. A.E. Basabi, J. He, S.M. Hashemi, Secure routing in IoT with multi-objective simulated annealing, in 2016 2nd IEEE Int. Conf. Comput. Commun. ICCC 2016 – Proc., (2017), pp. 2073–2076. https://doi.org/10.1109/CompComm.2016.7925065

    Chapter  Google Scholar 

  48. V. Arun, D.L. Reddy, S. Srinivas, Encryption standards for security system in energy harvesting for IoT requirements – Review, in Proc. Int. Conf. Intell. Sustain. Syst. ICISS 2017, no. Iciss, (2018), pp. 1224–1227. https://doi.org/10.1109/ISS1.2017.8389380

    Chapter  Google Scholar 

  49. K. Zhang, X. Liang, R. Lu, X. Shen, Sybil {Attacks} and {Their} {Defenses} in the {Internet} of {Things}. IEEE Internet Things J. 1(5), 372–383 (2014). https://doi.org/10.1109/JIOT.2014.2344013

    Article  Google Scholar 

  50. G. Zhan, W. Shi, J. Deng, Design and implementation of TARF: A trust-aware routing framework for WSNs. IEEE Trans. Dependable Secur. Comput. 9(2), 184–197 (2012). https://doi.org/10.1109/TDSC.2011.58

    Article  Google Scholar 

  51. A. Karaagac, J. Haxhibeqiri, I. Moerman, J. Hoebeke, Time-critical communication in 6TiSCH networks, in 2018 IEEE Wirel. Commun. Netw. Conf. Work. WCNCW 2018, (2018), pp. 161–166. https://doi.org/10.1109/WCNCW.2018.8368987

    Chapter  Google Scholar 

  52. P.P. Lokulwar, H.R. Deshmukh, Threat analysis and attacks modelling in routing towards IoT, in Proc. Int. Conf. IoT Soc. Mobile, Anal. Cloud, I-SMAC 2017, (2017), pp. 721–726. https://doi.org/10.1109/I-SMAC.2017.8058273

    Chapter  Google Scholar 

  53. A. Walid, A. Mostafa, M. Salama, MalNoD: Malicous node discovery in internet-of-things through fingerprints, in Proc. – 2017 Eur. Conf. Electr. Eng. Comput. Sci. EECS 2017, (2018), pp. 280–285. https://doi.org/10.1109/EECS.2017.58

    Chapter  Google Scholar 

  54. J. Duan, D. Yang, H. Zhu, S. Zhang, J. Zhao, TSRF: A trust-aware secure routing framework in wireless sensor networks. Int. J. Distrib. Sens. Networks 2014 (2014). https://doi.org/10.1155/2014/209436

  55. M.A. Lodhi, A. Rehman, Multiple path RPL for low power lossy networks, in 2015 IEEE Asia Pacific Conf. Wirel. Mob., (2015), pp. 279–284. https://doi.org/10.1109/APWiMob.2015.7374975

    Chapter  Google Scholar 

  56. L. Wallgren, S. Raza, T. Voigt, Routing attacks and countermeasures in the RPL-based internet of things. Int. J. Distrib. Sens. Networks 2013 (2013). https://doi.org/10.1155/2013/794326

  57. V. Mohammadi, A.M. Rahmani, A.M. Darwesh, A. Sahafi, Trust-based recommendation systems in Internet of Things: A systematic literature review. Human-centric Comput. Inf. Sci. 9(1) (2019). https://doi.org/10.1186/s13673-019-0183-8

  58. B. Pourghebleh, N.J. Navimipour, Data aggregation mechanisms in the Internet of things: A systematic review of the literature and recommendations for future research. J. Netw. Comput. Appl. 97, 23–34 (2017). https://doi.org/10.1016/j.jnca.2017.08.006

    Article  Google Scholar 

  59. S. Kalra, S.K. Sood, Secure authentication scheme for IoT and cloud servers. Pervasive Mob. Comput. 24, 210–223 (2015). https://doi.org/10.1016/j.pmcj.2015.08.001

    Article  Google Scholar 

  60. C. Zhao et al., Secure Multi-Party Computation: Theory, practice and applications. Inf. Sci. (Ny). 476, 357–372 (2019). https://doi.org/10.1016/j.ins.2018.10.024

    Article  Google Scholar 

  61. A. Al-fuqaha, S. Member, M. Guizani, M. Mohammadi, S. Member, Internet of Things: A Survey on Enabling. IEEE Commun. Surv. Tutorials 17(4), 2347–2376 (2015). https://doi.org/10.1109/COMST.2015.2444095

    Article  Google Scholar 

  62. J. Shen, T. Zhou, F. Wei, X. Sun, Y. Xiang, Privacy-preserving and lightweight key agreement protocol for V2G in the social internet of things. IEEE Internet Things J. 5(4), 2526–2536 (2018). https://doi.org/10.1109/JIOT.2017.2775248

    Article  Google Scholar 

  63. D. Barrera, I. Molloy, and H. Huang, Standardizing IoT Network Security Policy Enforcement. 2018. doi: https://doi.org/10.14722/diss.2018.23007.

  64. Z.K. Zhang, M.C.Y. Cho, C.W. Wang, C.W. Hsu, C.K. Chen, S. Shieh, IoT security: Ongoing challenges and research opportunities, in Proc. – IEEE 7th Int. Conf. Serv. Comput. Appl. SOCA 2014, (2014), pp. 230–234. https://doi.org/10.1109/SOCA.2014.58

    Chapter  Google Scholar 

  65. T. Alam, Blockchain and its role in the Internet of Things (IoT), in Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol., (2019), pp. 151–157. https://doi.org/10.32628/cseit195137

    Chapter  Google Scholar 

  66. A. Poniszewska-Maranda, D. Kaczmarek, Selected methods of artificial intelligence for Internet of Things conception, in Proc. 2015 Fed. Conf. Comput. Sci. Inf. Syst., vol. 5, (2015), pp. 1343–1348. https://doi.org/10.15439/2015f161

    Chapter  Google Scholar 

  67. O. Yurur, C.H. Liu, Z. Sheng, V.C.M. Leung, W. Moreno, K.K. Leung, Context-awareness for mobile sensing: A survey and future directions. IEEE Commun. Surv. Tutorials 18(1), 68–93 (2016). https://doi.org/10.1109/COMST.2014.2381246

    Article  Google Scholar 

  68. M. Song et al., In-situ AI: Towards autonomous and incremental deep learning for IoT systems, in Proc. – Int. Symp. High-Performance Comput. Archit., vol. 2018, (2018), pp. 92–103. https://doi.org/10.1109/HPCA.2018.00018

    Chapter  Google Scholar 

  69. K.E. Stansfield, F. Azmat, Developing high value IoT solutions using AI enhanced ISO 16355 for QFD integrating market drivers into the design of IoT offerings, in Proc. 2017 Int. Conf. Commun. Comput. Digit. Syst. C-CODE 2017, (2017), pp. 412–416. https://doi.org/10.1109/C-CODE.2017.7918967

    Chapter  Google Scholar 

  70. J. Knickerbocker et al., Heterogeneous integration technology demonstrations for future healthcare, IoT, and AI computing solutions, in Proc. – Electron. Components Technol. Conf., vol. 2018, (2018), pp. 1519–1528. https://doi.org/10.1109/ECTC.2018.00231

    Chapter  Google Scholar 

  71. S.B. Calo, M. Touna, D.C. Verma, A. Cullen, Edge computing architecture for applying AI to IoT, in Proc. – 2017 IEEE Int. Conf. Big Data, Big Data 2017, vol. 2018, (2018), pp. 3012–3016. https://doi.org/10.1109/BigData.2017.8258272

    Chapter  Google Scholar 

  72. S.S. Gill et al., Transformative effects of IoT, Blockchain and Artificial Intelligence on cloud computing: Evolution, vision, trends and open challenges. Internet of Things (2019). https://doi.org/10.1016/j.iot.2019.100118

  73. A. Riahi Sfar, E. Natalizio, Y. Challal, Z. Chtourou, A roadmap for security challenges in the Internet of Things. Digit. Commun. Networks 4(2), 118–137 (2018). https://doi.org/10.1016/j.dcan.2017.04.003

    Article  Google Scholar 

  74. M.G. Samaila, M. Neto, D.A.B. Fernandes, M.M. Freire, P.R.M. Inácio, Challenges of securing Internet of Things devices: A survey. Secur. Priv. 1(2), e20 (2018). https://doi.org/10.1002/spy2.20

    Article  Google Scholar 

  75. A. Assiri, H. Almagwashi, IoT security and privacy issues, in 1st Int. Conf. Comput. Appl. Inf. Secur. ICCAIS 2018, (2018), pp. 1–5. https://doi.org/10.1109/CAIS.2018.8442002

    Chapter  Google Scholar 

  76. A. Dorri, S.S. Kanhere, R. Jurdak, P. Gauravaram, Blockchain for IoT security and privacy: The case study of a smart home, in 2017 IEEE Int. Conf. Pervasive Comput. Commun. Work. PerCom Work. 2017, (2017), pp. 618–623. https://doi.org/10.1109/PERCOMW.2017.7917634

    Chapter  Google Scholar 

  77. B.K. Mohanta, D. Jena, S.S. Panda, S. Sobhanayak, Blockchain technology: A survey on applications and security privacy challenges. Internet of Things (2019). https://doi.org/10.1016/j.iot.2019.100107

  78. M.R. Palattella et al., Standardized protocol stack for the internet of (important) things. IEEE Commun. Surv. Tutorials 15(3), 1389–1406 (2013). https://doi.org/10.1109/SURV.2012.111412.00158

    Article  Google Scholar 

  79. E.M. Karanja, S. Masupe, M.G. Jeffrey, Analysis of internet of things malware using image texture features and machine learning techniques. Internet of Things 9, 100153 (2020). https://doi.org/10.1016/j.iot.2019.100153

    Article  Google Scholar 

  80. W. Shang-Ping, M. Qiao-Mei, Z. Ya-Ling, L. You-Sheng, An authentication protocol for RFID tag and its simulation. J. Networks 6(3), 446–453 (2011). https://doi.org/10.4304/jnw.6.3.446-453

    Article  Google Scholar 

  81. F. Ouakasse, S. Rakrak, From RFID tag ID to IPv6 address mapping mechanism, in Proc. – 2015 3rd Int. Work. RFID Adapt. Wirel. Sens. Networks, RAWSN 2015 – conjunction with Int. Conf. NETworked Syst. NETYS 2015, (2015), pp. 63–67. https://doi.org/10.1109/RAWSN.2015.7173281

    Chapter  Google Scholar 

  82. J. Venkatesh, C. Chan, A.S. Akyurek, T.S. Rosing, A modular approach to context-aware IoT applications, in Proc. – 2016 IEEE 1st Int. Conf. Internet-of-Things Des. Implementation, IoTDI 2016, (2016), pp. 235–240. https://doi.org/10.1109/IoTDI.2015.13

    Chapter  Google Scholar 

  83. H. Boyes, B. Hallaq, J. Cunningham, T. Watson, The industrial internet of things (IIoT): An analysis framework. Comput. Ind. 101, 1–12 (2018). https://doi.org/10.1016/j.compind.2018.04.015

    Article  Google Scholar 

  84. C. Perera, A. Zaslavsky, P. Christen, D. Georgakopoulos, Context aware computing for the internet of things: A survey. IEEE Commun. Surv. Tutorials 16(1), 414–454 (2014). https://doi.org/10.1109/SURV.2013.042313.00197

    Article  Google Scholar 

  85. D. Mcfarlane, Industrial Internet of Things: Applying IoT in the industrial context. (Online.) Available: https://www.scribd.com/document/432087496/IIOT. Accessed 16 Mar 2020.

  86. V. Nagamalla, A. Varanasi, A review of security frameworks for Internet of Things, in 2017 Int. Conf. Inf. Commun. Embed. Syst. ICICES 2017, (2017). https://doi.org/10.1109/ICICES.2017.8070757

    Chapter  Google Scholar 

  87. H.N. Saha, A. Mandal, A. Sinha, Recent trends in the Internet of Things, in 2017 IEEE 7th Annu. Comput. Commun. Work. Conf. CCWC 2017, (2017), pp. 1–4. https://doi.org/10.1109/CCWC.2017.7868439

    Chapter  Google Scholar 

  88. M.A. Ferrag, L. Maglaras, S. Moschoyiannis, H. Janicke, Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. J. Inf. Secur. Appl. (2020). https://doi.org/10.1016/j.jisa.2019.102419

  89. L. Urquhart, D. McAuley, Avoiding the internet of insecure industrial things. Comput. Law Secur. Rev. 34(3), 450–466 (2018). https://doi.org/10.1016/j.clsr.2017.12.004

    Article  Google Scholar 

  90. T.J. Charity, Smart world of Internet of Things (IoT) and it ‘ s security concerns, in 2016 IEEE Int. Conf. Internet Things IEEE Green Comput. Commun. IEEE Cyber, Phys. Soc. Comput. IEEE Smart Data, (2016), pp. 240–245. https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2016.64

    Chapter  Google Scholar 

  91. T. Mick, R. Tourani, S. Misra, LASeR: Lightweight Authentication and Secured Routing for NDN IoT in Smart Cities. IEEE Internet Things J. 5(2), 755–764 (2018). https://doi.org/10.1109/JIOT.2017.2725238

    Article  Google Scholar 

  92. Y. Lu, Journal of Industrial Information Integration Industry 4.0: A survey on technologies, applications and open research issues. J. Ind. Inf. Integr. 6, 1–10 (2017). https://doi.org/10.1016/j.jii.2017.04.005

    Article  Google Scholar 

  93. L. Yang, W. Li, S. Member, M. Ghandehari, G. Fortino, S. Member, People-centric cognitive Internet of Things for the quantitative analysis of environmental exposure. IEEE Internet Things J. 5(4), 2353–2366 (2018). https://doi.org/10.1109/JIOT.2017.2751307

    Article  Google Scholar 

  94. J. Miranda, N. Mäkitalo, J. Garcia-alonso, T. Mikkonen, From the Internet of Things to the Internet of People. 2015.

    Book  Google Scholar 

  95. M. Conti, A. Passarella, S.K. Das, The Internet of People (IoP): A new wave in pervasive mobile computing. Pervasive Mob. Comput. 41, 1–27 (2017). https://doi.org/10.1016/j.pmcj.2017.07.009

    Article  Google Scholar 

  96. G.S. Ramachandran, B. Krishnamachari, Blockchain for the IoT: Opportunities and challenges. May, (2018) [Online]. Available: http://arxiv.org/abs/1805.02818.

  97. C. Lee, L. Nkenyereye, N. Sung, J. Song, Towards a Blockchain-enabled IoT Platform using one M2M Standards, in 2018 Int. Conf. Inf. Commun. Technol. Converg., (2018), pp. 97–102

    Google Scholar 

  98. A. Botta, W. De Donato, V. Persico, A. Pescapé, Integration of Cloud computing and Internet of Things: A survey. Futur. Gener. Comput. Syst. 56(2018), 684–700 (2016). https://doi.org/10.1016/j.future.2015.09.021

    Article  Google Scholar 

  99. M. Marjani et al., Big IoT data analytics: Architecture, opportunities, and open research challenges. IEEE Access 5, 5247–5261 (2017). https://doi.org/10.1109/ACCESS.2017.2689040

    Article  Google Scholar 

  100. Cisco, The Internet of Everything Global Public Sector Economic Analysis. pp. 1–13 (2013) [Online]. Available: http://www.cisco.com/c/dam/en_us/about/business-insights/docs/ioe-value-at-stake-public-sector-analysis-faq.pdf.

  101. M.H. Miraz, M. Ali, P.S. Excell, R. Picking, A review on the Internet of Things (loT), Internet of Everything (IoE) and Internet of Nano Things (IoNT), in 2015 Internet Technol. Appl., (2015), pp. 219–224. https://doi.org/10.1109/ITechA.2015.7317398

    Chapter  Google Scholar 

  102. R. Chandhok, The Internet of Everything, in 2014 IEEE Hot Chips 26 Symp., (2014), pp. 1–29. https://doi.org/10.1109/HOTCHIPS.2014.7478826

    Chapter  Google Scholar 

  103. M. Stauffer, Connecting the Internet of Everything, in 2014 IEEE Hot Chips 26 Symp. HCS 2014, (2016). https://doi.org/10.1109/HOTCHIPS.2014.7478802

    Chapter  Google Scholar 

  104. T. You, Toward the future of internet architecture for IoE: Precedent research on evolving the identifier and locator separation schemes, in 2016 Int. Conf. Inf. Commun. Technol. Converg. ICTC 2016, (2016), pp. 436–439. https://doi.org/10.1109/ICTC.2016.7763513

    Chapter  Google Scholar 

  105. Z. Nezami, K. Zamanifar, Internet of Things/Internet of everything: Structure and ingredients. IEEE Potentials 38(2), 12–17 (2019). https://doi.org/10.1109/MPOT.2018.2855439

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Adamu Murtala Zungeru .

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Phalaagae, P., Zungeru, A.M., Sigweni, B., Chuma, J.M., Semong, T. (2020). IoT Sensor Networks Security Mechanisms/Techniques. In: Green Internet of Things Sensor Networks. Springer, Cham. https://doi.org/10.1007/978-3-030-54983-1_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-54983-1_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-54982-4

  • Online ISBN: 978-3-030-54983-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics