Skip to main content

Security Requirements for Internet of Things (IoT)

  • Conference paper
  • First Online:
Proceedings of International Conference on Communication and Networks

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 508))

Abstract

The Internet of Things (IoT) is the tomorrow’s Internet. It is being used in our everyday life where objects possessing sensing capabilities such as users, computing systems, and others are combined for convenience and economic benefits. Connecting various such devices is a challenging activity, as each device can have its architecture and security concerns. Various proposals are available in the literature to connect devices effectively, and various systems are there in the markets that are using this IoT concept. Hence dealing with all such interacting devices would be a challenging task when it comes to security. Also, various proposals are available that list the security issues present in IoT, but they are not defining the security requirements clearly for IoT. Therefore, in this paper, we are going to list the main security challenges for IoT and define the security requirements for IoT healthcare system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. IoT: https://en.wikipedia.org/wiki/Internet_of_Things.

  2. Granjal, J., Monteiro, E., Silva, .S.: Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues. IEEE Communication Surveys & Tutorials. 17 (3), 1294–1312 (2015).

    Google Scholar 

  3. Catuogno, L., Turchi, S.: The dark side of the interconnection: security and privacy in the Web of Things. In: 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 205–212. IEEE (2015).

    Google Scholar 

  4. Zhao, K., Ge, L.: A Survey on the Internet of Things Security. In: Ninth International Conference on Computational Intelligence and Security, pp. 663–667. IEEE (2013).

    Google Scholar 

  5. Chatterjee, K., Gupta, D., De, A.: A Framework for Development of Secure Software. CSI Transaction on ICT. 1(2), 143–157 (2013).

    Google Scholar 

  6. Riazul Islam, S.M., Kwak, D., Kabir, H., Hossain, M., Kwak, K.S.: The Internet of Things for Health Care: A Comprehensive Survey. IEEE Access 3: 678–708 (2015).

    Google Scholar 

  7. Firesmith, D.G.: Engineering Security Requirements. Journal of Object Technology. 2(1) 53–68 (2003).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shruti Jaiswal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Jaiswal, S., Gupta, D. (2017). Security Requirements for Internet of Things (IoT). In: Modi, N., Verma, P., Trivedi, B. (eds) Proceedings of International Conference on Communication and Networks. Advances in Intelligent Systems and Computing, vol 508. Springer, Singapore. https://doi.org/10.1007/978-981-10-2750-5_44

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-2750-5_44

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-2749-9

  • Online ISBN: 978-981-10-2750-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics