Abstract
Internet of Things (IoT)-based intelligent devices have been actively used in clouds to provide various data ranging from personal healthcare to disaster response. High acceptance rate of IoT devices resulting day-by-day increment in the number of Internet’s connected devices. The enormous growth of IoT devices and their reliability on wireless technologies make it vulnerable to cyberattacks which posing challenges for digital forensic experts. Security concern such as secure communication, access control, secure storage of information and privacy is major concern in IoT surroundings. The rapid growth of IoT services and devices resulted in the deployment of various insecure and vulnerable system. Furthermore, every single device including sensors that deployed in IoT network and each byte that is transmitted within the IoT network may come under scrutiny at some layer. This chapter identifies universal layers within the IoT architecture and discussed security vulnerability in all layers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ashton, K.: In the Real World, Things Matter more than Ideas. That ‘Internet of Things’ Thing (2009)
Lee, U., et al.: Intelligent positive computing with mobile, wearable, and IoT devices: literature review and research directions. Ad Hoc Netw. 83, 8–24 (2019)
Mohiuddin, I., Almogren, A.: Workload aware VM consolidation method in edge/cloud computing for IoT applications. J. Parallel Distrib. Comput. 123, 204–214 (2019)
Alam, M.G.R., Hassan, M.M., Zi, M., Uddin, A.Almogren, Fortino, G.: Autonomic computation offloading in mobile edge for IoT applications. Futur. Gener. Comput. Syst. 90, 149–157 (2019)
Sun, X., Ansari, N.: Dynamic resource caching in the IoT application layer for smart cities. IEEE Internet Things J. 5(2), 606–613 (2018)
Karatas, F., Korpeoglu, I.: Fog-based data distribution service (F-DAD) for internet of things (IoT) applications. Futur. Gener. Comput. Syst. 93, 156–169 (2019)
Zhang, N., Mi, X., Feng, X., Wang, X., Tian, Y., Qian, F.: Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home (2018)
Bahishti, A.A.: Humanoid robots and human society. Adv. J. Soc. Sci. 1(1), 60–63 (2017)
Yaqoob, I., Hashem, I.A.T., Ahmed, A., Kazmi, S.M.A., Hong, C.S.: Internet of things forensics: recent advances, taxonomy, requirements, and open challenges. Futur. Gener. Comput. Syst. 92, 265–275 (2019)
Qian, Y., et al.: Towards decentralized IoT security enhancement: a blockchain approach. Comput. Electr. Eng. 72, 266–273 (2018)
Beecher, P.: Enterprise-grade networks: the answer to IoT security challenges. Netw. Secur. 2018(7), 6–9 (2018)
Sadique, K.M., Rahmani, R., Johannesson, P.: Towards security on internet of things: applications and challenges in technology. Procedia Comput. Sci. 141, 199–206 (2018)
Riahi Sfar, A., Natalizio, E., Challal, Y., Chtourou, Z.: A roadmap for security challenges in the internet of things. Digit. Commun. Networks 4(2), 118–137 (2018)
Sethi, P., Sarangi, S.R.: Internet of things: architectures, protocols, and applications. J. Electr. Comput. Eng. 2017, 1–25 (2017)
Suo, H., Wan, J., Zou, C., Liu, J.: Security in the internet of things: a review. Int. Conf. Comput. Sci. Electr. Eng. 2012, 648–651 (2012)
Aziz, T., Haq, E.: Security challenges facing IoT layers and its protective measures. Int. J. Comput. Appl. 179(27), 31–35 (2018)
Chen, K., et al.: Internet-of-Things security and vulnerabilities: taxonomy, challenges, and practice. J. Hardw. Syst. Secur. 2(2), 97–110 (2018)
Silva, B.N., Khan, M., Han, K.: Internet of things: a comprehensive review of enabling technologies, architecture, and challenges. IETE Tech. Rev. 35(2), 205–220 (2018)
Mahmoud, R., Yousuf, T., Aloul, F., Zualkernan, I.: Internet of things (IoT) security: current status, challenges and prospective measures. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 336–341 (2015)
Li, L.: Study on security architecture in the internet of things. In: Proceedings of 2012 International Conference on Measurement, Information and Control, pp. 374–377 (2012)
Toshihiko, O.: Special Issue on IoT That Supports Digital Businesses Lightweight Cryptography Applicable to Various IoT Devices
Biryukov, A., Perrin, L.: State of the Art in Lightweight Symmetric Cryptography
Katagi, M., Moriai, S.: Lightweight Cryptography for the Internet of Things
Alaba, F.A., Othman, M., Hashem, I.A.T., Alotaibi, F.: Internet of things security: a survey. J. Netw. Comput. Appl. 88, 10–28 (2017)
Leo, M., Battisti, F., Carli, M., Neri, A.: A federated architecture approach for Internet of Things security. In: 2014 Euro Med Telco Conference (EMTC), pp. 1–5 (2014)
Zhang, W., Qu, B.: Security Architecture of the Internet of Things Oriented to Perceptual Layer (2013)
Yaqoob, I., Hashem, I.A.T., Mehmood, Y., Gani, A., Mokhtar, S., Guizani, S.: Enabling communication technologies for smart cities. IEEE Commun. Mag. 55(1), 112–120 (2017)
Naidu, G.A., Kumar, J., Garudachedu, V., Ramesh, P.R.: 6LoWPAN border router implementation for IoT devices on RaspberryPi. SSRN Electron. J. (2018)
Kavyashree, E.D.: 6LoWPAN network using Contiki operating system. In: NCICCNDA, pp. 300–310 (2018)
Farooq, M.U., Waseem, M., Khairi, A., Mazhar, S.: A critical analysis on the security concerns of internet of things (IoT). Int. J. Comput. Appl. 111(7), 1–6 (2015)
Stergiou, C., Psannis, K.E., Kim, B.-G., Gupta, B.: Secure integration of IoT and cloud computing. Futur. Gener. Comput. Syst. 78, 964–975 (2018)
Bittencourt, L., et al.: The internet of things, fog and cloud continuum: integration and challenges. Internet of Things 3–4, 134–155 (2018)
Mukherjee, B., et al.: Flexible IoT security middleware for end-to-end cloud–fog communication. Futur. Gener. Comput. Syst. 87, 688–703 (2018)
Yildirim, H., Ali-Eldin, A.M.T.: A model for predicting user intention to use wearable IoT devices at the workplace. J. King Saud Univ. Comput. Inf. Sci. (2018)
Jing, Q., Vasilakos, A.V., Wan, J., Lu, J., Qiu, D.: Security of the internet of things: perspectives and challenges. Wirel. Netw. 20(8), 2481–2501 (2014)
Valmohammadi, C.: Examining the perception of Iranian organizations on internet of things solutions and applications. Ind. Commer. Train. 48(2), 104–108 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Abdullah, A., Kaur, H., Biswas, R. (2020). Universal Layers of IoT Architecture and Its Security Analysis. In: Patnaik, S., Ip, A., Tavana, M., Jain, V. (eds) New Paradigm in Decision Science and Management. Advances in Intelligent Systems and Computing, vol 1005. Springer, Singapore. https://doi.org/10.1007/978-981-13-9330-3_30
Download citation
DOI: https://doi.org/10.1007/978-981-13-9330-3_30
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-9329-7
Online ISBN: 978-981-13-9330-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)