Abstract
Internet of Things (IoT) is considered as one of the latest intelligent communication technologies in the world. IoT has been growing in different architectural designs which contributes to the connection between heterogeneous IoT devices. Although, there are many different IoT architectures have been proposed, but they are still suffering from many challenges such as standardization, security, and privacy. This paper will focus on reviewing some existing IoT architectures used to provide security and privacy for IoT networks. Moreover, this paper will introduce a novel IoT security architecture model named IoT-EAA. IoT-EAA tends to satisfy different requirements of IoT security. Hence, the novelty of the proposed IoT-EAA architecture model comes from an important layer called the security layer. This layer employs an external and internal security service against different attacks for each layer within the IoT-EAA architecture model. The proposed architecture model is compared to existing IoT architectures based on several criteria such as security, power and time consumption. Therefore, the proposed IoT-EAA increases security and decrease the power and time consumption, which consider an important contribution to improving the performance of IoT architecture.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Farooq MU, Waseem M, Khairi A, Mazhar S (2015) A critical analysis on the security concerns of internet of things (IoT). Int J Comput Appl 111(7)
Soumyalatha SGH (2016, May) Study of IoT: understanding IoT architecture, applications, issues and challenges. In: 1st International conference on innovations in computing & networking (ICICN16), CSE, RRCE. Int J Adv Netw Appl
Rani P, Sri Lakshmi G (2017) IoT vulnerabilities and security. Int J 2:6
Aldosari HM (2015) A proposed security layer for the Internet of things communication reference model. Procedia Comput Sci 65:95–98
Bassi A, Bauer M, Fiedler M, Kranenburg RV (2013) Enabling things to talk. Springer-Verlag GmbH
Liu X, Zhao M, Li S, Zhang F, Trappe W (2017) A security framework for the internet of things in the future internet architecture. Future Internet 9(3):27
Kamel SOM, Hegazi NH (2018) A proposed model of IoT security management system based on a study of internet of things (IoT) security. Int J Sci Eng Res 9(9):1227 ISSN 2229-5518
Alhamedi AH, Snasel V, Aldosari HM, Abraham A (2014, July) Internet of things communication reference model. In: 2014 6th International conference on computational aspects of social networks (CASoN). IEEE, pp 61–66
Zhang Y (2011, September) Technology framework of the internet of things and its application. In 2011 International conference on electrical and control engineering. IEEE, pp 4109–4112
Fremantle P (2014) A reference architecture for the internet of things. WSO2 White paper
Kim JT (2015) Requirement of security for IoT application based on gateway system. Communications 9(10):201–208
Burmester M, De Medeiros B (2007, April) RFID security: attacks, countermeasures and challenges. In: The 5th RFID academic convocation, the RFID journal conference
Mitrokotsa A, Rieback MR, Tanenbaum AS (2010) Classification of RFID attacks. Gen 15693:14443
Li L (2012, May) Study on security architecture in the Internet of Things. In: Proceedings of 2012 international conference on measurement, information and control, vol 1. IEEE, pp 374–377
Douceur JR (2002, March) The sybil attack. In: International workshop on peer-to-peer systems. Springer, Berlin, Heidelberg, pp 251–260
Ahmed N, Kanhere SS, Jha S (2005) The holes problem in wireless sensor networks: a survey. ACM SIGMOBILE. Mobile Computing and Communications Review 9(2): 4–18
Bhattasali T, Chaki R, Sanyal S (2012) Sleep deprivation attack detection in wireless sensor network. arXiv preprint arXiv:1203.0231
Padmavathi DG, Shanmugapriya M (2009) A survey of attacks, security mechanisms and challenges in wireless sensor networks. arXiv preprint arXiv:0909.0576
Fulare PS, Chavhan N (2011) False data detection in wireless sensor network with secure communication. Int J Smart Sens Ad Hoc Netw (IJSSAN) 1(1):66–71
Farooq MU, Waseem M, Khairi A, Mazhar S (2015) A critical analysis on the security concerns of internet of things (IoT). Int J Comput Appl 111(7)
Padhy RP, Patra MR, Satapathy SC (2011) Cloud computing: security issues and research challenges. Int J Comput Sci Inf Technol Secur (IJCSITS) 1.2:136–146
Thakur BS, Chaudhary S (2013) Content sniffing attack detection in client and server side: a survey. Int J Adv Comput Res 3(2):7
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Elngar, A.A., Elsayed, E.K., Ibrahim, A.A. (2020). A New Efficient and Secure Architecture Model for Internet of Things. In: Khanna, A., Gupta, D., Bhattacharyya, S., Snasel, V., Platos, J., Hassanien, A. (eds) International Conference on Innovative Computing and Communications. Advances in Intelligent Systems and Computing, vol 1059. Springer, Singapore. https://doi.org/10.1007/978-981-15-0324-5_35
Download citation
DOI: https://doi.org/10.1007/978-981-15-0324-5_35
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0323-8
Online ISBN: 978-981-15-0324-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)