Abstract
Internet of Things is a novel concept that semantically implies a world-wide network of uniquely addressable interconnected smart objects. It is aimed at establishing any paradigm in computing. This environment is one where the boundary between virtual and physical world is eliminated. As the network gets loaded with hitherto unknown applications, security threats also become rampant. Current security solutions fail as new threats appear to destruct the reliability of information. The network has to be transformed to IPv6 enabled network to address huge number of smart objects. Thus new addressing schemes come up with new attacks. Real time analysis of information from the heterogeneous smart objects needs use of cloud services. This can fall prey to cloud specific security threats. Therefore need arises for a review of security threats for a new area having huge demand. Here a study of security issues in this domain is briefly presented.
Chapter PDF
Similar content being viewed by others
References
Sundmaeker, H., Guillemin, P., Friess, P.: Vision and Challenges for Realising the Internet of Things (2010) ISBN: 978-92-79-15088-3, doi:10.2759/26127
Libelium Unveils the Top 50 Internet of Things Applications, http://www.itwire.com/opinion-and-analysis/beerfiles/54432-libelium-unveils-the-top-50-internet-of-things-applications
Internet of Things in 2020: A roadmap for the future, Workshop report by EPoSS (European Technology Platform on Smart Systems Integration), http://www.iot-visitthefuture.eu/fileadmin/documents/researchforeurope270808_IoT_in_2020_Workshop_Report_V1_1.pdf
Dash, S.K., Mohapatra, S., Pattnaik, P.K.: A Survey on Applications of Wireless Sensor Network Using Cloud Computing. International Journal of Computer Science & Emerging Technologies 1(4) (December 2010) (E-ISSN: 2044-6004)
Ahmed, K., Gregory, M.: Integrating Wireless Sensor Networks with Cloud Computing. In: Proceedigs of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks (2011)
The Internet of Things 2012 New Horizons, www.internet-of-things-research.eu
White Paper: Smart Networked Objects and Internet of Things, http://www.iot-a.eu/public/news/white-paper-smart-networked-objects-and-internet-of-things
Roman, R., Najera, P., Lopez, J.: Securing the Internet of Things. IEEE Computer 44(9), 51–58 (2011)
Bhattasali, T., Chaki, R.: A Survey of Recent Intrusion Detection Systems for Wireless Sensor Network. In: Wyld, D.C., Wozniak, M., Chaki, N., Meghanathan, N., Nagamalai, D. (eds.) CNSA 2011. CCIS, vol. 196, pp. 268–280. Springer, Heidelberg (2011)
Bhattasali, T., Chaki, R.: Lightweight Hierarchical Model for HWSNET. International Journal of Advanced Smart Sensor Network Systems (IJASSN) 1(2), 17–32 (2011), doi:10.5121/ijassn.2011.1202, ISSN: 2231-4482 [Online], 2231-5225 [Print]
Bhattasali, T., Chaki, R., Sanyal, S.: Sleep Deprivation Attack Detection in Wireless Sensor Network. International Journal of Computer Applications 40(15), 19–25 (2012), doi:10.5120/5056-7374, ISBN: 978-93-80866-55-8
IPv6 and IPv4 Threat Comparison and Best Practice Evaluation, Cisco, www.cisco.com/security_services/ciag/documents/v6-v4-threats.pdf
Yuriyama, M., Kushida, T.: Sensor-Cloud Infrastructure. In: Proceedings of the 13th International Conference on Network- Based Information Systems (2010)
Kapadia, A., Kotz, D., Triandopoulos, N.: Opportunistic Sensing: Security Challenges for the New Paradigm. In: Proceedings of the First International Conference on Communication Systems and Networks (COMSNETS) (January 2009)
Kapadia, A., Myvers, S., Wang, X., Fox, G.: Secure Cloud Computing with Brokered Trusted Sensor Networks. In: Proceedings of the International Symposium on Collaborative Technologies and Systems (CTS 2010) (May 2010)
Zhang, L., Zhao, K.: Study on Security of Next Generation Network, IEEE, Supported by Open Fund from Resources and Environment Management Lab (2008)
Sethi, M.: Security in Smart object Networks (2012), nordsecmob.aalto.fi/en/publications/theses_2012/sethi-mohit_thesis.pdf
Zhou, S., Xie, Z.: On Cryptographic Approaches to Internet-of-Things Security, www.lix.polytechnique.fr/hipercom/.../papers/ZhouSujing.pdf
Cirani, S., Ferrari, G., Veltri, L.: Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview (2013), http://www.mdpi.com/1999-4893/6/2/197
Amin, S.O., Siddiqui, M.S., Hong, C.S., Choe, J.: A Novel Coding Scheme to Implement Signature Based IDS in IP Based Sensor Networks. In: Conference Proceedings of International Symposium on Integrated Network Management Workshops (IM 2009), New York (2009) ISBN: 978-1-4244-3923-2
Amin, S.O., Yoon, Y.J., Siddiqui, M.S., Hong, C.S.: A Novel Intrusion Detection Framework for IP Based Sensor Networks. In: Conference Proceedings of International Conference on Information Networking, Chiang Mai (2009) ISBN: 978-89-960761-3-1
Fu, R., Zheng, K., Zhang, D., Yang, Y.: An Intrusion Detection Scheme Based on Anomaly Mining in Internet of Things. In: Conference Proceedings of the 4th International Conference on Wireless, Mobile and Multimedia Networks (ICWMMN 2011), China (2011)
Liu, C., Yang, J., Zhang, Y., Chen, R., Zeng, J.: Research on Immunity-based Intrusion Detection Technology for the Internet of Things. In: Conference Proceedings of the Seventh International Conference on Natural Computation (ICNC), Shanghai (2011) ISBN: 978-1-4244-9950-2
Dash, B.: Security in Pervasive Computing (2006), web.cs.wpi.edu/~kven/papers/Sec_Pervasive_Healthcare.pdf
Varshney, U: Pervasive Healthcare and Wireless Health Monitoring (2007), www.cens.ucla.edu/~mhr/cs219/varshney07.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 IFIP International Federation for Information Processing
About this paper
Cite this paper
Bhattasali, T., Chaki, R., Chaki, N. (2013). Study of Security Issues in Pervasive Environment of Next Generation Internet of Things. In: Saeed, K., Chaki, R., Cortesi, A., Wierzchoń, S. (eds) Computer Information Systems and Industrial Management. CISIM 2013. Lecture Notes in Computer Science, vol 8104. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40925-7_20
Download citation
DOI: https://doi.org/10.1007/978-3-642-40925-7_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40924-0
Online ISBN: 978-3-642-40925-7
eBook Packages: Computer ScienceComputer Science (R0)