Abstract
In recent years, several efforts have been made by many researchers to emphasize security issues in the IoT sensor network framework. It is evident from prior research that the area of security and privacy has caught the attention of many researchers. Although the focus of this chapter is to review recent research techniques and mechanisms to ensure IoT security, some related works do not exclusively focus on security areas such as security and privacy issues, and their solutions, in the IoT system architecture. This work aims to unearth research opportunities to address security issues and challenges. The contribution of this work focuses on providing a layered approach to propose solutions to layer security challenges using emerging technologies for securing sensor networks through mechanisms such as lightweight encryption, authentication trust recommendation, and secure cloud computing. The work presents recent trends in current research on securing IoT communication and applications concerning the IoT architecture. The study further gives insights on the need for convergence with several interdisciplinary technologies to improve the security of IoT through opportunities such as blockchain, machine learning, and the development of context-aware applications, IoP and IoE should be further investigated to review real-life examples and analysis of their effectiveness towards enhancing privacy and security in wireless IoT sensor networks.
This is a preview of subscription content, access via your institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, M. Ayyash, Internet of Things: A survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutorials 17(4) (2015). https://doi.org/10.1109/COMST.2015.2444095
J. Granjal, E. Monteiro, J.S. Silva, Security for the Internet of things: A survey of existing protocols and open research issues. IEEE Commun. Surv. Tutorials 17(3), 1294–1312 (2015). https://doi.org/10.1109/COMST.2015.2388550
S. Nisha and M. Farik, RSA public key cryptography algorithm-a review. Int. J. Sci. Technol. Res. 6(7) (2017) [Online]. Available: www.ijstr.org.
M.A. Ferrag, L.A. Maglaras, H. Janicke, J. Jiang, L. Shu, Authentication protocols for Internet of things: A comprehensive survey. Secur. Commun. Networks 2017 (2017). https://doi.org/10.1155/2017/6562953
S. Madakam, R. Ramaswamy, S. Tripathi, Jcc_2015052516013923. J. Comput. Commun. 2015, 164–173 (2015). https://doi.org/10.4236/jcc.2015.35021
I. Ali, S. Sabir, Z. Ullah, Internet of things security, device authentication and access control: A review. 14(8), 456–466 (2019) [Online]. Available: http://arxiv.org/abs/1901.07309.
A. Tewari, B.B. Gupta, Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework. Futur. Gener. Comput. Syst. (2018). https://doi.org/10.1016/j.future.2018.04.027
J. Deogirikar, A. Vidhate, Security attacks in IoT: A survey. Proc. Int. Conf. IoT Soc. Mobile, Anal. Cloud, I-SMAC 2017, 32–37 (2017). https://doi.org/10.1109/I-SMAC.2017.8058363
A.A.A. Ari et al., Enabling privacy and security in Cloud of Things: Architecture, applications, security & privacy challenges. Appl. Comput. Informatics (2019). https://doi.org/10.1016/j.aci.2019.11.005
M. Pirretti, S. Zhu, N. Vijaykrishnan, P. McDaniel, M. Kandemir, R. Brooks, The sleep deprivation attack in sensor networks: Analysis and methods of defense. Int. J. Distrib. Sens. Networks 2(3), 267–287 (2006). https://doi.org/10.1080/15501320600642718
V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal, B. Sikdar, A survey on IoT security: Application areas, security threats, and solution architectures. IEEE Access 7, 82721–82743 (2019). https://doi.org/10.1109/ACCESS.2019.2924045
B.B. Zarpelão, R.S. Miani, C.T. Kawakani, S.C. de Alvarenga, A survey of intrusion detection in Internet of Things. J. Netw. Comput. Appl. 84, 25–37 (2017). https://doi.org/10.1016/j.jnca.2017.02.009
K. Chen et al., Internet-of-Things security and vulnerabilities: Taxonomy, challenges, and practice. J. Hardw. Syst. Secur. 2(2), 97–110 (2018). https://doi.org/10.1007/s41635-017-0029-7
X. Li, J. Xu, H.N. Dai, Q. Zhao, C.F. Cheang, Q. Wang, On modeling eavesdropping attacks in wireless networks. J. Comput. Sci. 11, 196–204 (2015). https://doi.org/10.1016/j.jocs.2014.10.006
D. Sopori, T. Pawar, M. Patil, R. Ravindran, Internet of Things: Security threats. Ijarcet.Org 6(3), 263–267 (2017) [Online]. Available: http://ijarcet.org/wp-content/uploads/IJARCET-VOL-6-ISSUE-3-263-267.pdf.
K. Somasundaram, K. Selvam, IOT – attacks and challenges. Int. J. Eng. Tech. Res. 8(9), 9–12 (2018). https://doi.org/10.31873/ijetr.8.9.67
G. Glissa, A. Rachedi, A. Meddeb, A secure routing protocol based on RPL for internet of things, in 2016 IEEE Glob. Commun. Conf. GLOBECOM 2016 - Proc., (2016), pp. 1–7. https://doi.org/10.1109/GLOCOM.2016.7841543
M. Bouabdellah, N. Kaabouch, F. El Bouanani, H. Ben-Azza, Network layer attacks and countermeasures in cognitive radio networks: A survey. J. Inf. Secur. Appl. 38, 40–49 (2018). https://doi.org/10.1016/j.jisa.2017.11.010
I. Stojmenovic, S. Wen, The fog computing paradigm: Scenarios and security issues. Proc. 2014 Fed. Conf. Comput. Sci. Inf. Syst. 2, 1–8 (2014). https://doi.org/10.15439/2014f503
S. Subashini, V. Kavitha, A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011). https://doi.org/10.1016/j.jnca.2010.07.006
S. Al Jadaani, M. Al Maliki, W. Al Ghamdi, M. Hemalatha, Security issues in cloud computing. Int. J. Appl. Eng. Res. 11(12), 7669–7671 (2016). https://doi.org/10.5120/6369-8736
R. Mahmoud, T. Yousuf, F. Aloul, I. Zualkernan, Internet of Things (IoT) Security: Current status, challenges and prospective measures, in 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), (IEEE, London, 2015)
V. Beltran, A.F. Skarmeta, An overview on delegated authorization for CoAP: Authentication and authorization for Constrained Environments (ACE), in 2016 IEEE 3rd World Forum Internet Things, WF-IoT 2016, (2017), pp. 706–710. https://doi.org/10.1109/WF-IoT.2016.7845482
P. Nespoli, M. Zago, A.H. Celdran, M.G. Perez, F.G. Marmol, F.J. Garcia Clernente, A dynamic continuous authentication framework in IoT-enabled environments, in 2018 5th Int. Conf. Internet Things Syst. Manag. Secur. IoTSMS 2018, (2018), pp. 131–138. https://doi.org/10.1109/IoTSMS.2018.8554389
M. El-Hajj, M. Chamoun, A. Fadlallah, A. Serhrouchni, Analysis of authentication techniques in Internet of Things (IoT), in 2017 1st Cyber Secur. Netw. Conf. CSNet 2017, vol. 2017, (2017), pp. 1–3. https://doi.org/10.1109/CSNET.2017.8242006
N. Tapas, G. Merlino, F. Longo, Blockchain-Based IoT-cloud authorization and delegation, in Proc. – 2018 IEEE Int. Conf. Smart Comput. SMARTCOMP 2018, (2018), pp. 411–416. https://doi.org/10.1109/SMARTCOMP.2018.00038
Z.A. Alizai, N.F. Tareen, I. Jadoon, Improved IoT device authentication scheme using device capability and digital signatures, in ICAEM 2018 – 2018 Int. Conf. Appl. Eng. Math. Proc., (2018), pp. 115–119. https://doi.org/10.1109/ICAEM.2018.8536261
J.H. Han, J.N. Kim, A lightweight authentication mechanism between IoT devices, in Int. Conf. Inf. Commun. Technol. Converg. ICT Converg. Technol. Lead. Fourth Ind. Revolution, ICTC 2017, vol. 2017, (2017), pp. 1153–1155. https://doi.org/10.1109/ICTC.2017.8190883
P. Musale, D. Baek, B.J. Choi, Lightweight gait based authentication technique for IoT using subconscious level activities, in IEEE World Forum Internet Things, WF-IoT 2018 – Proc., vol. 2018, (2018), pp. 564–567. https://doi.org/10.1109/WF-IoT.2018.8355210
P. Hao, X. Wang, W. Shen, A collaborative PHY-aided technique for end-to-end IoT device authentication. IEEE Access 6, 42279–42293 (2018). https://doi.org/10.1109/ACCESS.2018.2859781
T. Shah, S. Venkatesan, Authentication of IoT device and IoT server using secure vaults, in Proc. – 17th IEEE Int. Conf. Trust. Secur. Priv. Comput. Commun. 12th IEEE Int. Conf. Big Data Sci. Eng. Trust. 2018, (2018), pp. 819–824. https://doi.org/10.1109/TrustCom/BigDataSE.2018.00117
N. Abbas, Y. Zhang, A. Taherkordi, T. Skeie, Mobile edge computing: A survey. IEEE Internet Things J. 5(1), 450–465 (2018). https://doi.org/10.1109/JIOT.2017.2750180
Y. Lu, Industry 4.0: A survey on technologies, applications and open research issues. J. Ind. Inf. Integr. 6, 1–10 (2017). https://doi.org/10.1016/j.jii.2017.04.005
R. Jinnai, A. Inomata, I. Arai, K. Fujikawa, Proposal of hardware device model for IoT endpoint security and its implementation, in 2017 IEEE Int. Conf. Pervasive Comput. Commun. Work. PerCom Work. 2017, (2017), pp. 91–93. https://doi.org/10.1109/PERCOMW.2017.7917533
F. Rahman, M. Farmani, M. Tehranipoor, Y. Jin, Hardware-assisted cybersecurity for IoT devices, in 2017 18th Int. Work. Microprocess. SOC Test Verif., (2017), pp. 51–56. https://doi.org/10.1109/MTV.2017.16
F. Bruguier, P. Benoit, L. Torres, L. Bossuet, Hardware security: From concept to application, in 2016 11th Eur. Work. Microelectron. Educ. EWME 2016, (2016), pp. 1–6. https://doi.org/10.1109/EWME.2016.7496483
K. Sudeendra Kumar, S. Sahoo, A. Mahapatra, A.K. Swain, K.K. Mahapatra, Security enhancements to system on chip devices for IoT perception layer, in Proc. – 2017 IEEE Int. Symp. Nanoelectron. Inf. Syst. iNIS 2017, vol. 2018, (2018), pp. 151–156. https://doi.org/10.1109/iNIS.2017.39
L. Xiao, X. Wan, X. Lu, Y. Zhang, D. Wu, IoT security techniques based on machine learning: How do iot devices use AI to enhance security? IEEE Signal Process. Mag. 35(5), 41–49 (2018). https://doi.org/10.1109/MSP.2018.2825478
R. Tripathi, S. Agrawal, Comparative study of symmetric and asymmetric cryptography. Int. J. Adv. Found. Res. Comput. 1 (6), 68–76 (2014) [Online]. Available: https://pdfs.semanticscholar.org/e0e4/810c5276f9c05cc82425fcf911f206c52bef.pdf.
N. Alsaffar, W. Elmedany, H. Ali, Application of RC5 for IoT devices in smart transportation system, in 2019 8th Int. Conf. Model. Simul. Appl. Optim. ICMSAO 2019, (2019), pp. 1–4. https://doi.org/10.1109/ICMSAO.2019.8880351
D. Mendez, I. Papapanagiotou, B. Yang, Internet of Things: Survey on Security and Privacy. pp. 1–16, 2020.
T.K. Goyal, V. Sahula, Lightweight security algorithm for low power IoT devices, in 2016 Int. Conf. Adv. Comput. Commun. Informatics, ICACCI 2016, (2016), pp. 1725–1729. https://doi.org/10.1109/ICACCI.2016.7732296
Y. Xiao, G. Gao, An independent individual certification scheme based on digital watermark in WSNs, in Proc. – 2019 IEEE Int. Conf. Smart Internet Things, SmartIoT 2019, (2019), pp. 474–478. https://doi.org/10.1109/SmartIoT.2019.00086
I. Ud Din et al., The Internet of Things: A review of enabled technologies and future challenges. IEEE Access 7, 7606–7640 (2019). https://doi.org/10.1109/ACCESS.2018.2886601
R. van der Meulen, Gartner says 8.4 billion connected ‘Things’ will be in use in 2017, up 31 percent from 2016. Gartner (2017) https://www.gartner.com/en/newsroom/press-releases/2017-02-07-gartner-says-8-billion-connected-things-will-be-in-use-in-2017-up-31-percent-from-2016. Accessed 20 July 2019
J. Karlsson, L.S. Dooley, G. Pulkkis, Secure routing for MANET connected Internet of things systems, in Proc. – 2018 IEEE 6th Int. Conf. Futur. Internet Things Cloud, FiCloud 2018, (2018), pp. 114–119. https://doi.org/10.1109/FiCloud.2018.00024
A.E. Basabi, J. He, S.M. Hashemi, Secure routing in IoT with multi-objective simulated annealing, in 2016 2nd IEEE Int. Conf. Comput. Commun. ICCC 2016 – Proc., (2017), pp. 2073–2076. https://doi.org/10.1109/CompComm.2016.7925065
V. Arun, D.L. Reddy, S. Srinivas, Encryption standards for security system in energy harvesting for IoT requirements – Review, in Proc. Int. Conf. Intell. Sustain. Syst. ICISS 2017, no. Iciss, (2018), pp. 1224–1227. https://doi.org/10.1109/ISS1.2017.8389380
K. Zhang, X. Liang, R. Lu, X. Shen, Sybil {Attacks} and {Their} {Defenses} in the {Internet} of {Things}. IEEE Internet Things J. 1(5), 372–383 (2014). https://doi.org/10.1109/JIOT.2014.2344013
G. Zhan, W. Shi, J. Deng, Design and implementation of TARF: A trust-aware routing framework for WSNs. IEEE Trans. Dependable Secur. Comput. 9(2), 184–197 (2012). https://doi.org/10.1109/TDSC.2011.58
A. Karaagac, J. Haxhibeqiri, I. Moerman, J. Hoebeke, Time-critical communication in 6TiSCH networks, in 2018 IEEE Wirel. Commun. Netw. Conf. Work. WCNCW 2018, (2018), pp. 161–166. https://doi.org/10.1109/WCNCW.2018.8368987
P.P. Lokulwar, H.R. Deshmukh, Threat analysis and attacks modelling in routing towards IoT, in Proc. Int. Conf. IoT Soc. Mobile, Anal. Cloud, I-SMAC 2017, (2017), pp. 721–726. https://doi.org/10.1109/I-SMAC.2017.8058273
A. Walid, A. Mostafa, M. Salama, MalNoD: Malicous node discovery in internet-of-things through fingerprints, in Proc. – 2017 Eur. Conf. Electr. Eng. Comput. Sci. EECS 2017, (2018), pp. 280–285. https://doi.org/10.1109/EECS.2017.58
J. Duan, D. Yang, H. Zhu, S. Zhang, J. Zhao, TSRF: A trust-aware secure routing framework in wireless sensor networks. Int. J. Distrib. Sens. Networks 2014 (2014). https://doi.org/10.1155/2014/209436
M.A. Lodhi, A. Rehman, Multiple path RPL for low power lossy networks, in 2015 IEEE Asia Pacific Conf. Wirel. Mob., (2015), pp. 279–284. https://doi.org/10.1109/APWiMob.2015.7374975
L. Wallgren, S. Raza, T. Voigt, Routing attacks and countermeasures in the RPL-based internet of things. Int. J. Distrib. Sens. Networks 2013 (2013). https://doi.org/10.1155/2013/794326
V. Mohammadi, A.M. Rahmani, A.M. Darwesh, A. Sahafi, Trust-based recommendation systems in Internet of Things: A systematic literature review. Human-centric Comput. Inf. Sci. 9(1) (2019). https://doi.org/10.1186/s13673-019-0183-8
B. Pourghebleh, N.J. Navimipour, Data aggregation mechanisms in the Internet of things: A systematic review of the literature and recommendations for future research. J. Netw. Comput. Appl. 97, 23–34 (2017). https://doi.org/10.1016/j.jnca.2017.08.006
S. Kalra, S.K. Sood, Secure authentication scheme for IoT and cloud servers. Pervasive Mob. Comput. 24, 210–223 (2015). https://doi.org/10.1016/j.pmcj.2015.08.001
C. Zhao et al., Secure Multi-Party Computation: Theory, practice and applications. Inf. Sci. (Ny). 476, 357–372 (2019). https://doi.org/10.1016/j.ins.2018.10.024
A. Al-fuqaha, S. Member, M. Guizani, M. Mohammadi, S. Member, Internet of Things: A Survey on Enabling. IEEE Commun. Surv. Tutorials 17(4), 2347–2376 (2015). https://doi.org/10.1109/COMST.2015.2444095
J. Shen, T. Zhou, F. Wei, X. Sun, Y. Xiang, Privacy-preserving and lightweight key agreement protocol for V2G in the social internet of things. IEEE Internet Things J. 5(4), 2526–2536 (2018). https://doi.org/10.1109/JIOT.2017.2775248
D. Barrera, I. Molloy, and H. Huang, Standardizing IoT Network Security Policy Enforcement. 2018. doi: https://doi.org/10.14722/diss.2018.23007.
Z.K. Zhang, M.C.Y. Cho, C.W. Wang, C.W. Hsu, C.K. Chen, S. Shieh, IoT security: Ongoing challenges and research opportunities, in Proc. – IEEE 7th Int. Conf. Serv. Comput. Appl. SOCA 2014, (2014), pp. 230–234. https://doi.org/10.1109/SOCA.2014.58
T. Alam, Blockchain and its role in the Internet of Things (IoT), in Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol., (2019), pp. 151–157. https://doi.org/10.32628/cseit195137
A. Poniszewska-Maranda, D. Kaczmarek, Selected methods of artificial intelligence for Internet of Things conception, in Proc. 2015 Fed. Conf. Comput. Sci. Inf. Syst., vol. 5, (2015), pp. 1343–1348. https://doi.org/10.15439/2015f161
O. Yurur, C.H. Liu, Z. Sheng, V.C.M. Leung, W. Moreno, K.K. Leung, Context-awareness for mobile sensing: A survey and future directions. IEEE Commun. Surv. Tutorials 18(1), 68–93 (2016). https://doi.org/10.1109/COMST.2014.2381246
M. Song et al., In-situ AI: Towards autonomous and incremental deep learning for IoT systems, in Proc. – Int. Symp. High-Performance Comput. Archit., vol. 2018, (2018), pp. 92–103. https://doi.org/10.1109/HPCA.2018.00018
K.E. Stansfield, F. Azmat, Developing high value IoT solutions using AI enhanced ISO 16355 for QFD integrating market drivers into the design of IoT offerings, in Proc. 2017 Int. Conf. Commun. Comput. Digit. Syst. C-CODE 2017, (2017), pp. 412–416. https://doi.org/10.1109/C-CODE.2017.7918967
J. Knickerbocker et al., Heterogeneous integration technology demonstrations for future healthcare, IoT, and AI computing solutions, in Proc. – Electron. Components Technol. Conf., vol. 2018, (2018), pp. 1519–1528. https://doi.org/10.1109/ECTC.2018.00231
S.B. Calo, M. Touna, D.C. Verma, A. Cullen, Edge computing architecture for applying AI to IoT, in Proc. – 2017 IEEE Int. Conf. Big Data, Big Data 2017, vol. 2018, (2018), pp. 3012–3016. https://doi.org/10.1109/BigData.2017.8258272
S.S. Gill et al., Transformative effects of IoT, Blockchain and Artificial Intelligence on cloud computing: Evolution, vision, trends and open challenges. Internet of Things (2019). https://doi.org/10.1016/j.iot.2019.100118
A. Riahi Sfar, E. Natalizio, Y. Challal, Z. Chtourou, A roadmap for security challenges in the Internet of Things. Digit. Commun. Networks 4(2), 118–137 (2018). https://doi.org/10.1016/j.dcan.2017.04.003
M.G. Samaila, M. Neto, D.A.B. Fernandes, M.M. Freire, P.R.M. Inácio, Challenges of securing Internet of Things devices: A survey. Secur. Priv. 1(2), e20 (2018). https://doi.org/10.1002/spy2.20
A. Assiri, H. Almagwashi, IoT security and privacy issues, in 1st Int. Conf. Comput. Appl. Inf. Secur. ICCAIS 2018, (2018), pp. 1–5. https://doi.org/10.1109/CAIS.2018.8442002
A. Dorri, S.S. Kanhere, R. Jurdak, P. Gauravaram, Blockchain for IoT security and privacy: The case study of a smart home, in 2017 IEEE Int. Conf. Pervasive Comput. Commun. Work. PerCom Work. 2017, (2017), pp. 618–623. https://doi.org/10.1109/PERCOMW.2017.7917634
B.K. Mohanta, D. Jena, S.S. Panda, S. Sobhanayak, Blockchain technology: A survey on applications and security privacy challenges. Internet of Things (2019). https://doi.org/10.1016/j.iot.2019.100107
M.R. Palattella et al., Standardized protocol stack for the internet of (important) things. IEEE Commun. Surv. Tutorials 15(3), 1389–1406 (2013). https://doi.org/10.1109/SURV.2012.111412.00158
E.M. Karanja, S. Masupe, M.G. Jeffrey, Analysis of internet of things malware using image texture features and machine learning techniques. Internet of Things 9, 100153 (2020). https://doi.org/10.1016/j.iot.2019.100153
W. Shang-Ping, M. Qiao-Mei, Z. Ya-Ling, L. You-Sheng, An authentication protocol for RFID tag and its simulation. J. Networks 6(3), 446–453 (2011). https://doi.org/10.4304/jnw.6.3.446-453
F. Ouakasse, S. Rakrak, From RFID tag ID to IPv6 address mapping mechanism, in Proc. – 2015 3rd Int. Work. RFID Adapt. Wirel. Sens. Networks, RAWSN 2015 – conjunction with Int. Conf. NETworked Syst. NETYS 2015, (2015), pp. 63–67. https://doi.org/10.1109/RAWSN.2015.7173281
J. Venkatesh, C. Chan, A.S. Akyurek, T.S. Rosing, A modular approach to context-aware IoT applications, in Proc. – 2016 IEEE 1st Int. Conf. Internet-of-Things Des. Implementation, IoTDI 2016, (2016), pp. 235–240. https://doi.org/10.1109/IoTDI.2015.13
H. Boyes, B. Hallaq, J. Cunningham, T. Watson, The industrial internet of things (IIoT): An analysis framework. Comput. Ind. 101, 1–12 (2018). https://doi.org/10.1016/j.compind.2018.04.015
C. Perera, A. Zaslavsky, P. Christen, D. Georgakopoulos, Context aware computing for the internet of things: A survey. IEEE Commun. Surv. Tutorials 16(1), 414–454 (2014). https://doi.org/10.1109/SURV.2013.042313.00197
D. Mcfarlane, Industrial Internet of Things: Applying IoT in the industrial context. (Online.) Available: https://www.scribd.com/document/432087496/IIOT. Accessed 16 Mar 2020.
V. Nagamalla, A. Varanasi, A review of security frameworks for Internet of Things, in 2017 Int. Conf. Inf. Commun. Embed. Syst. ICICES 2017, (2017). https://doi.org/10.1109/ICICES.2017.8070757
H.N. Saha, A. Mandal, A. Sinha, Recent trends in the Internet of Things, in 2017 IEEE 7th Annu. Comput. Commun. Work. Conf. CCWC 2017, (2017), pp. 1–4. https://doi.org/10.1109/CCWC.2017.7868439
M.A. Ferrag, L. Maglaras, S. Moschoyiannis, H. Janicke, Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. J. Inf. Secur. Appl. (2020). https://doi.org/10.1016/j.jisa.2019.102419
L. Urquhart, D. McAuley, Avoiding the internet of insecure industrial things. Comput. Law Secur. Rev. 34(3), 450–466 (2018). https://doi.org/10.1016/j.clsr.2017.12.004
T.J. Charity, Smart world of Internet of Things (IoT) and it ‘ s security concerns, in 2016 IEEE Int. Conf. Internet Things IEEE Green Comput. Commun. IEEE Cyber, Phys. Soc. Comput. IEEE Smart Data, (2016), pp. 240–245. https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2016.64
T. Mick, R. Tourani, S. Misra, LASeR: Lightweight Authentication and Secured Routing for NDN IoT in Smart Cities. IEEE Internet Things J. 5(2), 755–764 (2018). https://doi.org/10.1109/JIOT.2017.2725238
Y. Lu, Journal of Industrial Information Integration Industry 4.0: A survey on technologies, applications and open research issues. J. Ind. Inf. Integr. 6, 1–10 (2017). https://doi.org/10.1016/j.jii.2017.04.005
L. Yang, W. Li, S. Member, M. Ghandehari, G. Fortino, S. Member, People-centric cognitive Internet of Things for the quantitative analysis of environmental exposure. IEEE Internet Things J. 5(4), 2353–2366 (2018). https://doi.org/10.1109/JIOT.2017.2751307
J. Miranda, N. Mäkitalo, J. Garcia-alonso, T. Mikkonen, From the Internet of Things to the Internet of People. 2015.
M. Conti, A. Passarella, S.K. Das, The Internet of People (IoP): A new wave in pervasive mobile computing. Pervasive Mob. Comput. 41, 1–27 (2017). https://doi.org/10.1016/j.pmcj.2017.07.009
G.S. Ramachandran, B. Krishnamachari, Blockchain for the IoT: Opportunities and challenges. May, (2018) [Online]. Available: http://arxiv.org/abs/1805.02818.
C. Lee, L. Nkenyereye, N. Sung, J. Song, Towards a Blockchain-enabled IoT Platform using one M2M Standards, in 2018 Int. Conf. Inf. Commun. Technol. Converg., (2018), pp. 97–102
A. Botta, W. De Donato, V. Persico, A. Pescapé, Integration of Cloud computing and Internet of Things: A survey. Futur. Gener. Comput. Syst. 56(2018), 684–700 (2016). https://doi.org/10.1016/j.future.2015.09.021
M. Marjani et al., Big IoT data analytics: Architecture, opportunities, and open research challenges. IEEE Access 5, 5247–5261 (2017). https://doi.org/10.1109/ACCESS.2017.2689040
Cisco, The Internet of Everything Global Public Sector Economic Analysis. pp. 1–13 (2013) [Online]. Available: http://www.cisco.com/c/dam/en_us/about/business-insights/docs/ioe-value-at-stake-public-sector-analysis-faq.pdf.
M.H. Miraz, M. Ali, P.S. Excell, R. Picking, A review on the Internet of Things (loT), Internet of Everything (IoE) and Internet of Nano Things (IoNT), in 2015 Internet Technol. Appl., (2015), pp. 219–224. https://doi.org/10.1109/ITechA.2015.7317398
R. Chandhok, The Internet of Everything, in 2014 IEEE Hot Chips 26 Symp., (2014), pp. 1–29. https://doi.org/10.1109/HOTCHIPS.2014.7478826
M. Stauffer, Connecting the Internet of Everything, in 2014 IEEE Hot Chips 26 Symp. HCS 2014, (2016). https://doi.org/10.1109/HOTCHIPS.2014.7478802
T. You, Toward the future of internet architecture for IoE: Precedent research on evolving the identifier and locator separation schemes, in 2016 Int. Conf. Inf. Commun. Technol. Converg. ICTC 2016, (2016), pp. 436–439. https://doi.org/10.1109/ICTC.2016.7763513
Z. Nezami, K. Zamanifar, Internet of Things/Internet of everything: Structure and ingredients. IEEE Potentials 38(2), 12–17 (2019). https://doi.org/10.1109/MPOT.2018.2855439
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2020 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Phalaagae, P., Zungeru, A.M., Sigweni, B., Chuma, J.M., Semong, T. (2020). IoT Sensor Networks Security Mechanisms/Techniques. In: Green Internet of Things Sensor Networks. Springer, Cham. https://doi.org/10.1007/978-3-030-54983-1_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-54983-1_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-54982-4
Online ISBN: 978-3-030-54983-1
eBook Packages: Computer ScienceComputer Science (R0)