The Internet of Things (IoT) brings connectivity to about every objects found in the physical space. It extends connectivity to everyday objects. From connected fridges, cars and cities, the IoT creates opportunities in numerous domains. However, this increase in connectivity creates many prominent challenges. This paper provides a survey of some of the major issues challenging the widespread adoption of the IoT. Particularly, it focuses on the interoperability, management, security and privacy issues in the IoT. It is concluded that there is a need to develop a multifaceted technology approach to IoT security,
management, and privacy.
Hardware/Software Interoperability and Single Point Vulnerability Problems of...BRNSS Publication Hub
As reiterated by many authors, internet of things (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data, creating opportunities for more direct integration of the physical world into computer-based systems, resulting in efficiency improvements, economic benefits, and reduced human exertions. This is made possible by the communications models with the enabling technologies which make communications possible among IoT connected devices, although, with drawbacks. These drawbacks are the major reasons for adoption problems of IoT services by the society. This paper carried out an investigative study on previous works on the societal applications and adoption problems of IoT, IoT communications models, and pros and cons of IoT. Through the study, it was revealed that for IoT devices and services to be widely adopted with no or minimal problems, future IoT technology will not only address the known drawbacks but also will require hardware and software components that are highly interoperable, dependable, reconfigurable, and, in many applications, certifiable.
IoT: Ongoing challenges and opportunities in Mobile TechnologyAI Publications
Mobile technology opens the door for a new kind of learning called here and now learning that occurs when learners have access to information anytime and anywhere to perform authentic activities in the context of their learning. Mobile devices, applications and services have become integrated into people's daily lives on a personal and professional level. The purpose of this study was to investigate challenges &opportunities of IoT in mobile technology. The paper is divided in 5 sections and the content of the paper covers the history, elements, challenges and opportunities salong with future of IoT specific to Indian Mobile arena.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVEScsandit
The common vision of smart systems today, is by and large associated with one single concept,
the internet of things (IoT), where the whole physical infrastructure is linked with intelligent
monitoring and communication technologies through the use of wireless sensors. In such an
intelligent vibrant system, sensors are connected to send useful information and control
instructions via distributed sensor networks. Wireless sensors have an easy deployment and
better flexibility of devices contrary to wired setup. With the rapid technological development of
sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an
invaluable resource for realizing the vision of Internet of things (IoT) paradigm. It is also
important to consider whether the sensors of a WSN should be completely integrated into IoT or
not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a
number of security primitives that can be taken to protect their data over the internet.
In the past decade, internet of things (IoT) has been a
focus of research. Security and privacy are the key issues for IoT
applications, and still face some enormous challenges. In order to
facilitate this emerging domain, we in brief review the research
progress of IoT, and pay attention to the security. By means of
deeply analyzing the security architecture and features, the
security requirements are given. On the basis of these, we discuss
the research status of key technologies including encryption
mechanism, communication security, protecting sensor data and
cryptographic algorithms, and briefly outline the challenges.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESIJCNCJournal
The common vision of smart systems today, is by and large associated with one single concept, the internet of things (IoT), where the whole physical infrastructure is linked with intelligent monitoring and communication technologies through the use of wireless sensors. In such an intelligent vibrant system, sensors are connected to send useful information and control instructions via distributed sensor networks. Wireless sensors have an easy deployment and better flexibility of devices contrary to wired setup. With the rapid technological development of sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an invaluable resource for realizing the vision of Internet of things (IoT) paradigm.
It is also important to consider whether the sensors of a WSN should be completely integrated into IoT or not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a number of security primitives that can be taken to protect their data over the internet.
Hardware/Software Interoperability and Single Point Vulnerability Problems of...BRNSS Publication Hub
As reiterated by many authors, internet of things (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data, creating opportunities for more direct integration of the physical world into computer-based systems, resulting in efficiency improvements, economic benefits, and reduced human exertions. This is made possible by the communications models with the enabling technologies which make communications possible among IoT connected devices, although, with drawbacks. These drawbacks are the major reasons for adoption problems of IoT services by the society. This paper carried out an investigative study on previous works on the societal applications and adoption problems of IoT, IoT communications models, and pros and cons of IoT. Through the study, it was revealed that for IoT devices and services to be widely adopted with no or minimal problems, future IoT technology will not only address the known drawbacks but also will require hardware and software components that are highly interoperable, dependable, reconfigurable, and, in many applications, certifiable.
IoT: Ongoing challenges and opportunities in Mobile TechnologyAI Publications
Mobile technology opens the door for a new kind of learning called here and now learning that occurs when learners have access to information anytime and anywhere to perform authentic activities in the context of their learning. Mobile devices, applications and services have become integrated into people's daily lives on a personal and professional level. The purpose of this study was to investigate challenges &opportunities of IoT in mobile technology. The paper is divided in 5 sections and the content of the paper covers the history, elements, challenges and opportunities salong with future of IoT specific to Indian Mobile arena.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVEScsandit
The common vision of smart systems today, is by and large associated with one single concept,
the internet of things (IoT), where the whole physical infrastructure is linked with intelligent
monitoring and communication technologies through the use of wireless sensors. In such an
intelligent vibrant system, sensors are connected to send useful information and control
instructions via distributed sensor networks. Wireless sensors have an easy deployment and
better flexibility of devices contrary to wired setup. With the rapid technological development of
sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an
invaluable resource for realizing the vision of Internet of things (IoT) paradigm. It is also
important to consider whether the sensors of a WSN should be completely integrated into IoT or
not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a
number of security primitives that can be taken to protect their data over the internet.
In the past decade, internet of things (IoT) has been a
focus of research. Security and privacy are the key issues for IoT
applications, and still face some enormous challenges. In order to
facilitate this emerging domain, we in brief review the research
progress of IoT, and pay attention to the security. By means of
deeply analyzing the security architecture and features, the
security requirements are given. On the basis of these, we discuss
the research status of key technologies including encryption
mechanism, communication security, protecting sensor data and
cryptographic algorithms, and briefly outline the challenges.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESIJCNCJournal
The common vision of smart systems today, is by and large associated with one single concept, the internet of things (IoT), where the whole physical infrastructure is linked with intelligent monitoring and communication technologies through the use of wireless sensors. In such an intelligent vibrant system, sensors are connected to send useful information and control instructions via distributed sensor networks. Wireless sensors have an easy deployment and better flexibility of devices contrary to wired setup. With the rapid technological development of sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an invaluable resource for realizing the vision of Internet of things (IoT) paradigm.
It is also important to consider whether the sensors of a WSN should be completely integrated into IoT or not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a number of security primitives that can be taken to protect their data over the internet.
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
The idea to connect everything to anything and at any point of time is what vaguely defines the concept of
the Internet of Things (IoT). The IoT is not only about providing connectivity but also facilitating
interaction among these connected things. Though the term IoT was introduced in 1999 but has drawn
significant attention during the past few years, the pace at which new devices are being integrated into the
system will profoundly impact the world in a good way but also poses some severe queries about security
and privacy. IoT in its current form is susceptible to a multitudinous set of attacks. One of the most
significant concerns of IoT is to provide security assurance for the data exchange because data is
vulnerable to some attacks by the attackers at each layer of IoT. The IoT has a layered structure where
each layer provides a service. The security needs vary from layer to layer as each layer serves a different
purpose. This paper aims to analyze the various security and privacy threats related to IoT. Some attacks
have been discussed along with some existing and proposed countermeasures.
The Internet of things IoT is a relatively new concept. It presents numerous benefits to consumers and proves a financial boon for businesses. Pervasive introduction of sensors and devices into currently intimate spaces, such as homes, cars, and wearables, poses some challenges. There are also challenges in deploying IoT by government agencies and private industries. This paper attempts to address these challenges and offers solutions. Matthew N. O. Sadiku | Adedamola Omotoso | Shuza Binzaid | Sarhan M. Musa "Internet of Things: Challenges and Solutions" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29302.pdf Paper URL: https://www.ijtsrd.com/engineering/electrical-engineering/29302/internet-of-things-challenges-and-solutions/matthew-n-o-sadiku
In this presentation, Chittrieta introduces the topic of IoT, current applications of IoT and associated trends. Chittrieta's interest lies in application of IoT on the shop floor in the manufacturing vertical.
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...DESMOND YUEN
Internet of Things (IoT) is an innovative paradigm
envisioned to provide massive applications that are now part of
our daily lives. Millions of smart devices are deployed within
complex networks to provide vibrant functionalities including
communications, monitoring, and controlling of critical infrastructures. However, this massive growth of IoT devices and the corresponding huge data traffic generated at the edge of the network created additional burdens on the state-of-the-art
centralized cloud computing paradigm due to the bandwidth and
resources scarcity. Hence, edge computing (EC) is emerging as
an innovative strategy that brings data processing and storage
near to the end users, leading to what is called EC-assisted IoT.
Although this paradigm provides unique features and enhanced
quality of service (QoS), it also introduces huge risks in data security and privacy aspects. This paper conducts a comprehensive survey on security and privacy issues in the context of EC-assisted IoT. In particular, we first present an overview of EC-assisted IoT including definitions, applications, architecture, advantages, and challenges. Second, we define security and privacy in the context of EC-assisted IoT. Then, we extensively discuss the major classifications of attacks in EC-assisted IoT and provide possible solutions and countermeasures along with the related research efforts. After that, we further classify some security and privacy issues as discussed in the literature based on security services and based on security objectives and functions. Finally, several open challenges and future research directions for secure EC-assisted IoT paradigm are also extensively provided.
The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.
The Internet of Things (IoT): An OverviewIJERA Editor
Information and Communications Technology (ICT) controls our daily behaviors. It becomes a main part of our
life critical infrastructure bringing interconnection of heterogeneous devices in different aspects. Personal
computing, sensing, surveillance, smart homes, entertainment, transportation and video streaming are examples,
to name a few. As a critical living entity, Internet is contentiously changing and evolving leading to emerging
new technologies, applications, protocols and algorithms. Acceleration of wireless communication trends brings
an ever growing innovation in Internet connectivity and mobile broadband. Infrastructureless communication
devices become ubiquitous, smart, powerful, connectible, smaller, cheaper, and easier to deploy and install. This
opens a new future direction in the society of ICT: the Internet of Things (IoT). Nowadays, the IoT, early
defined as Machine-to-Machine (M2M) communications, becomes a key concern of ICT world and research
communities. In this paper, we provide an overview study of the IoT paradigm, its concepts, principles and
potential benefits. Specifically, we focus on the IoT major technologies, emerging protocols, and widespread
applications. This overview can help those who start approaching the IoT world aiming to understand and
participate to its development.
This report is prepared for the major project submission for EC Engineering, This project deals with the development of Home Monitoring System using Internet of Things.
This is first detailed report submitted ever with whole content over Internet of Things based Home Automation system. Help of many journals have been taken and those references have been acknowledged at the end of the report file.
Internet of Things (IoT) integrates billions of the heterogeneous IoT things with the Internet in which the embedded systems such as sensors and actuators linked together to improve quality of life, and becomes the future of technologies in any field of human daily life. These IoT devices cooperate with each other and generate useful information to provide better services and applications to the governments and the society. Also, there is a need to store these data on Cloud for monitoring. This paper, surveys IoT applications, new challenges and issues arise in different fields and provides IoT architecture, focuses on explanation of IoT protocols and their operations and functionalities, presents different microcontroller types used by researchers. With the huge amount of data generated from IoT devices, the integrating Cloud and IoT may helpful, Therefore, a survey on open issues faced when these two concepts integrating together is discussed. The objective of this paper is to provide a survey for everything related to IoT and direct it to all beginners in this filed or academic researchers.
Speech to first year graduate students at Babson College on the attitudinal shifts that will allow the IoT to transform business away from hierarchy to innovative circular organizations
Research Issues, Challenges and Directions in IoT (Internet of Things)Praveen Hanchinal
Presentation focuses on Research Issues, Challenges and Directions in IoT (Internet of Things) at This Presentation was presented at Kongu Engineering College, Erode, India
Understanding the different building blocks of IoT, identifying the areas of vulnerability in each block and exploring technologies needed to counter each of the weaknesses are essential in dealing with the security issue of IoT.
Internet of Things IoT Anytime Anywhere Anything ConnectivityYogeshIJTSRD
This paper presents the key challenges in the domain of IoT. The key challenges associated with the development of IoT, industry as well as government, Industrial IoT systems, the related security and privacy challenges has been reviewed and presented. Vulnerability of Internet of Things systems have been improved with the advent of new computational systems for IoT. However, the current design of IoT does not effectively address the higher security requirements posed by those vulnerabilities. Many recent attacks on IoT systems have shown that novel security solutions are needed to protect this emerging system. Nidhi Chadha | Ramandeep Kaur "Internet of Things (IoT): Anytime-Anywhere-Anything Connectivity" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd40008.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-network/40008/internet-of-things-iot-anytimeanywhereanything-connectivity/nidhi-chadha
A MIDDLEWARE FOR THE INTERNET OF THINGSIJCNCJournal
The Internet of Things (IoT) connects everyday objects including a vast array of sensors, actuators, and smart devices, referred to as “things” to the Internet, in an intelligent and pervasive fashion. This connectivity gives rise to the possibility of using the tracking capabilities of things to impinge on the location privacy of users. Most of the existing management and location privacy protection solutions do not consider the low-cost and low-power requirements of things; or, they do not account for the heterogeneity, scalability, or autonomy of communications supported in the IoT. Moreover, these traditional solutions do not consider the case where a user wishes to control the granularity of the disclosed information based on
the context of their use (e.g. based on the time or the current location of the user). To fill this gap, a middleware, referred to as the Internet of Things Management Platform (IoT-MP) is proposed in this paper.
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
The idea to connect everything to anything and at any point of time is what vaguely defines the concept of
the Internet of Things (IoT). The IoT is not only about providing connectivity but also facilitating
interaction among these connected things. Though the term IoT was introduced in 1999 but has drawn
significant attention during the past few years, the pace at which new devices are being integrated into the
system will profoundly impact the world in a good way but also poses some severe queries about security
and privacy. IoT in its current form is susceptible to a multitudinous set of attacks. One of the most
significant concerns of IoT is to provide security assurance for the data exchange because data is
vulnerable to some attacks by the attackers at each layer of IoT. The IoT has a layered structure where
each layer provides a service. The security needs vary from layer to layer as each layer serves a different
purpose. This paper aims to analyze the various security and privacy threats related to IoT. Some attacks
have been discussed along with some existing and proposed countermeasures.
The Internet of things IoT is a relatively new concept. It presents numerous benefits to consumers and proves a financial boon for businesses. Pervasive introduction of sensors and devices into currently intimate spaces, such as homes, cars, and wearables, poses some challenges. There are also challenges in deploying IoT by government agencies and private industries. This paper attempts to address these challenges and offers solutions. Matthew N. O. Sadiku | Adedamola Omotoso | Shuza Binzaid | Sarhan M. Musa "Internet of Things: Challenges and Solutions" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29302.pdf Paper URL: https://www.ijtsrd.com/engineering/electrical-engineering/29302/internet-of-things-challenges-and-solutions/matthew-n-o-sadiku
In this presentation, Chittrieta introduces the topic of IoT, current applications of IoT and associated trends. Chittrieta's interest lies in application of IoT on the shop floor in the manufacturing vertical.
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...DESMOND YUEN
Internet of Things (IoT) is an innovative paradigm
envisioned to provide massive applications that are now part of
our daily lives. Millions of smart devices are deployed within
complex networks to provide vibrant functionalities including
communications, monitoring, and controlling of critical infrastructures. However, this massive growth of IoT devices and the corresponding huge data traffic generated at the edge of the network created additional burdens on the state-of-the-art
centralized cloud computing paradigm due to the bandwidth and
resources scarcity. Hence, edge computing (EC) is emerging as
an innovative strategy that brings data processing and storage
near to the end users, leading to what is called EC-assisted IoT.
Although this paradigm provides unique features and enhanced
quality of service (QoS), it also introduces huge risks in data security and privacy aspects. This paper conducts a comprehensive survey on security and privacy issues in the context of EC-assisted IoT. In particular, we first present an overview of EC-assisted IoT including definitions, applications, architecture, advantages, and challenges. Second, we define security and privacy in the context of EC-assisted IoT. Then, we extensively discuss the major classifications of attacks in EC-assisted IoT and provide possible solutions and countermeasures along with the related research efforts. After that, we further classify some security and privacy issues as discussed in the literature based on security services and based on security objectives and functions. Finally, several open challenges and future research directions for secure EC-assisted IoT paradigm are also extensively provided.
The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.
The Internet of Things (IoT): An OverviewIJERA Editor
Information and Communications Technology (ICT) controls our daily behaviors. It becomes a main part of our
life critical infrastructure bringing interconnection of heterogeneous devices in different aspects. Personal
computing, sensing, surveillance, smart homes, entertainment, transportation and video streaming are examples,
to name a few. As a critical living entity, Internet is contentiously changing and evolving leading to emerging
new technologies, applications, protocols and algorithms. Acceleration of wireless communication trends brings
an ever growing innovation in Internet connectivity and mobile broadband. Infrastructureless communication
devices become ubiquitous, smart, powerful, connectible, smaller, cheaper, and easier to deploy and install. This
opens a new future direction in the society of ICT: the Internet of Things (IoT). Nowadays, the IoT, early
defined as Machine-to-Machine (M2M) communications, becomes a key concern of ICT world and research
communities. In this paper, we provide an overview study of the IoT paradigm, its concepts, principles and
potential benefits. Specifically, we focus on the IoT major technologies, emerging protocols, and widespread
applications. This overview can help those who start approaching the IoT world aiming to understand and
participate to its development.
This report is prepared for the major project submission for EC Engineering, This project deals with the development of Home Monitoring System using Internet of Things.
This is first detailed report submitted ever with whole content over Internet of Things based Home Automation system. Help of many journals have been taken and those references have been acknowledged at the end of the report file.
Internet of Things (IoT) integrates billions of the heterogeneous IoT things with the Internet in which the embedded systems such as sensors and actuators linked together to improve quality of life, and becomes the future of technologies in any field of human daily life. These IoT devices cooperate with each other and generate useful information to provide better services and applications to the governments and the society. Also, there is a need to store these data on Cloud for monitoring. This paper, surveys IoT applications, new challenges and issues arise in different fields and provides IoT architecture, focuses on explanation of IoT protocols and their operations and functionalities, presents different microcontroller types used by researchers. With the huge amount of data generated from IoT devices, the integrating Cloud and IoT may helpful, Therefore, a survey on open issues faced when these two concepts integrating together is discussed. The objective of this paper is to provide a survey for everything related to IoT and direct it to all beginners in this filed or academic researchers.
Speech to first year graduate students at Babson College on the attitudinal shifts that will allow the IoT to transform business away from hierarchy to innovative circular organizations
Research Issues, Challenges and Directions in IoT (Internet of Things)Praveen Hanchinal
Presentation focuses on Research Issues, Challenges and Directions in IoT (Internet of Things) at This Presentation was presented at Kongu Engineering College, Erode, India
Understanding the different building blocks of IoT, identifying the areas of vulnerability in each block and exploring technologies needed to counter each of the weaknesses are essential in dealing with the security issue of IoT.
Internet of Things IoT Anytime Anywhere Anything ConnectivityYogeshIJTSRD
This paper presents the key challenges in the domain of IoT. The key challenges associated with the development of IoT, industry as well as government, Industrial IoT systems, the related security and privacy challenges has been reviewed and presented. Vulnerability of Internet of Things systems have been improved with the advent of new computational systems for IoT. However, the current design of IoT does not effectively address the higher security requirements posed by those vulnerabilities. Many recent attacks on IoT systems have shown that novel security solutions are needed to protect this emerging system. Nidhi Chadha | Ramandeep Kaur "Internet of Things (IoT): Anytime-Anywhere-Anything Connectivity" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd40008.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-network/40008/internet-of-things-iot-anytimeanywhereanything-connectivity/nidhi-chadha
A MIDDLEWARE FOR THE INTERNET OF THINGSIJCNCJournal
The Internet of Things (IoT) connects everyday objects including a vast array of sensors, actuators, and smart devices, referred to as “things” to the Internet, in an intelligent and pervasive fashion. This connectivity gives rise to the possibility of using the tracking capabilities of things to impinge on the location privacy of users. Most of the existing management and location privacy protection solutions do not consider the low-cost and low-power requirements of things; or, they do not account for the heterogeneity, scalability, or autonomy of communications supported in the IoT. Moreover, these traditional solutions do not consider the case where a user wishes to control the granularity of the disclosed information based on
the context of their use (e.g. based on the time or the current location of the user). To fill this gap, a middleware, referred to as the Internet of Things Management Platform (IoT-MP) is proposed in this paper.
Study on Fog Computing and Data Concurrency in IoT. Includes an analysis of different data concurrency techniques, their principle and some recent developments in the area. Also covers the topic of Fog Computing and its development and application in IoT.
MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...ijmnct
The Ubiquitous Power Internet of Things (UPIoT) is a deep integration of the interconnected power
network and communication network, enabling full perception of the system status and business operations
for power production, transmission, and consumption. To address the challenges of real-time perception,
rapid response, and privacy protection, UPIoT can benefit from the use of edge computing technology.
Edge computing is a new and innovative computing architecture that enables quick and efficient
processing of data close to the source, bypassing network latency and bandwidth issues. By shifting
computing power to the edge of the network, edge computing reduces the strain on cloud computing
centers and decreases input response time for users. However, access latency can still be a bottleneck,
which may overshadow the benefits of edge computing, particularly for data-intensive services. While edge
computing offers promising solutions for the IoT network, there are still some issues to address, such as
security, incomplete data, and investment and maintenance costs. In this paper, researcher conducts a
comprehensive survey of edge computing and how edge device placement can improve performance in IoT
networks. The paper includes a comparative use case of smart agriculture edge computing
implementations and discusses the various challenges faced in implementing edge computing in the UPIoT
context. The results also aim to inspire new edge-based IoT security designs by providing a complete
review of IoT security solutions at the edge layer in UPIoT
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESIJNSA Journal
The Internet of Things (IoT) is a growing trend in technology that interconnects millions of physical devices from any location anytime. Currently, IoT devices have become an integral part of human lives, as such organizations are deeply concerned with its security and technical issues. Blockchain system comprises a distributed digital ledger which is shared among community of users on the Internet; validated and recorded transactions in the ledger which cannot be altered or removed. We presented the challenges of IoT devices and how blockchain can be used to alleviate these problems. An outline of how to integrate blockchain with IoT was tackled, highlighting the challenges of IoT and how blockchain can remedy the issues. It was concluded that blockchain has the capability to curb the challenges posed by IoT devices.
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
In 2020 more than50 billions devices will be connected over the Internet. Every device will be connected to
anything, anyone, anytime and anywhere in the world of Internet of Thing or IoT. This network will
generate tremendous unstructured or semi structured data that should be shared between different
devices/machines for advanced and automated service delivery in the benefits of the user’s daily life. Thus,
mechanisms for data interoperability and automatic service discovery and delivery should be offered.
Although many approaches have been suggested in the state of art, none of these researches provide a fully
interoperable, light, flexible and modular Sensing/Actuating as service architecture. Therefore, this paper
introduces a new Semantic Multi Agent architecture named OntoSmart for IoT data and service
management through service oriented paradigm. It proposes sensors/actuators and scenarios independent
flexible context aware and distributed architecture for IoT systems, in particular smart home systems.
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
In 2020 more than50 billions devices will be connected over the Internet. Every device will be connected to
anything, anyone, anytime and anywhere in the world of Internet of Thing or IoT. This network will
generate tremendous unstructured or semi structured data that should be shared between different
devices/machines for advanced and automated service delivery in the benefits of the user’s daily life. Thus,
mechanisms for data interoperability and automatic service discovery and delivery should be offered.
Although many approaches have been suggested in the state of art, none of these researches provide a fully
interoperable, light, flexible and modular Sensing/Actuating as service architecture. Therefore, this paper
introduces a new Semantic Multi Agent architecture named OntoSmart for IoT data and service
management through service oriented paradigm. It proposes sensors/actuators and scenarios independent
flexible context aware and distributed architecture for IoT systems, in particular smart home systems.
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
In 2020 more than50 billions devices will be connected over the Internet. Every device will be connected to
anything, anyone, anytime and anywhere in the world of Internet of Thing or IoT. This network will
generate tremendous unstructured or semi structured data that should be shared between different
devices/machines for advanced and automated service delivery in the benefits of the user’s daily life. Thus,
mechanisms for data interoperability and automatic service discovery and delivery should be offered.
Although many approaches have been suggested in the state of art, none of these researches provide a fully
interoperable, light, flexible and modular Sensing/Actuating as service architecture. Therefore, this paper
introduces a new Semantic Multi Agent architecture named OntoSmart for IoT data and service
management through service oriented paradigm. It proposes sensors/actuators and scenarios independent
flexible context aware and distributed architecture for IoT systems, in particular smart home systems.
Internet of Things (IoT) plays a vital role in our
day to day life and normally used in our houses, in industry,
schools and in hospitals which implemented outside to manage
and control for taking report the changes in location prevent
from dangers and many more favorable things. Moreover all
other advantages can approach of big risks of privacy loss and
security issues. To protect the IoT devices, so many research
works have been measure to find those problems and locate a
best way to eradicate those risks or at least to reduce their effect
on the security and privacy requirement. Formation the concept
of device to device (D2D) communication technology, IoT plays
the information transfer from one end to another end as node of
interconnection. This paper examines the constraints and
security challenges posed by IoT connected devices and the
ability to connect, communicate with, and remotely manage an
incalculable number of networked, automated devices via the
Internet is becoming pervasive.
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
The idea to connect everything to anything and at any point of time is what vaguely defines the concept of the Internet of Things (IoT). The IoT is not only about providing connectivity but also facilitating interaction among these connected things. Though the term IoT was introduced in 1999 but has drawn significant attention during the past few years, the pace at which new devices are being integrated into the system will profoundly impact the world in a good way but also poses some severe queries about security and privacy. IoT in its current form is susceptible to a multitudinous set of attacks. One of the most significant concerns of IoT is to provide security assurance for the data exchange because data is vulnerable to some attacks by the attackers at each layer of IoT. The IoT has a layered structure where each layer provides a service. The security needs vary from layer to layer as each layer serves a different purpose. This paper aims to analyze the various security and privacy threats related to IoT. Some attacks have been discussed along with some existing and proposed countermeasures.
In this presentation, Sujani introduces IoT and latest trends in that domain. Sujani is interested in security of IoT devices where she wants to tackle both access of IoT devices and the data generated by these devices.
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
The introduction of Internet of Things (IoT) applications into daily life has raised serious privacy concerns
among consumers, network service providers, device manufacturers, and other parties involved. This paper
gives a high-level overview of the three phases of data collecting, transmission, and storage in IoT systems
as well as current privacy-preserving technologies. The following elements were investigated during these
three phases:(1) Physical and data connection layer security mechanisms(2) Network remedies(3)
Techniques for distributing and storing data. Real-world systems frequently have multiple phases and
incorporate a variety of methods to guarantee privacy. Therefore, for IoT research, design, development,
and operation, having a thorough understanding of all phases and their technologies can be beneficial. In
this Study introduced two independent methodologies namely generic differential privacy (GenDP) and
Cluster-Based Differential privacy ( Cluster-based DP) algorithms for handling metadata as intents and
intent scope to maintain privacy and security of IoT data in cloud environments. With its help, we can
virtual and connect enormous numbers of devices, get a clearer understanding of the IoT architecture, and
store data eternally. However, due of the dynamic nature of the environment, the diversity of devices, the
ad hoc requirements of multiple stakeholders, and hardware or network failures, it is a very challenging
task to create security-, privacy-, safety-, and quality-aware Internet of Things apps. It is becoming more
and more important to improve data privacy and security through appropriate data acquisition. The
proposed approach resulted in reduced loss performance as compared to Support Vector Machine (SVM) ,
Random Forest (RF) .
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
When Internet of Things (IoT) applications become a part of people’s daily life, security issues in IoT have caught substantial attention in both academia and industry. Compared to traditional computing systems, IoT systems have more inherent vulnerabilities, and in the intervening time, could have higher security requirements. However, the current design of IoT does not successfully address the higher security requirements postured by those vulnerabilities. Many recent attacks on IoT systems have shown that novel security solutions are needed to defend this emerging system. This paper purposes to examine security challenges resulted from the special characteristics of the IoT systems and the new features of the IoT applications. This could help pave the road to better security solution design. Furthermore, three architectural security designs are suggested and analyzed. Examples of how to implement these designs are discussed. Finally, for each layer in IoT architecture, open issues are also identified.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
1. International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.2, March 2016
DOI : 10.5121/ijnsa.2016.8206 85
THE INTERNET OF THINGS: NEW
INTEROPERABILITY, MANAGEMENT AND SECURITY
CHALLENGES
Mahmoud Elkhodr, Seyed Shahrestani and Hon Cheung
School of Computing, Engineering and Mathematics, Western Sydney University,
Sydney, Australia
ABSTRACT
The Internet of Things (IoT) brings connectivity to about every objects found in the physical space. It
extends connectivity to everyday objects. From connected fridges, cars and cities, the IoT creates
opportunities in numerous domains. However, this increase in connectivity creates many prominent
challenges. This paper provides a survey of some of the major issues challenging the widespread adoption
of the IoT. Particularly, it focuses on the interoperability, management, security and privacy issues in the
IoT. It is concluded that there is a need to develop a multifaceted technology approach to IoT security,
management, and privacy.
KEYWORDS
Internet of Things, Wireless Network, Security, Privacy, Management & Interoperability
1. INTRODUCTION
The Internet of Things (IoT) goes beyond the typical computer-based-Internet model to a
distributed heterogeneous model of connected things. The state of the art application in the IoT
provides IoT services based on utilizing and combining data received from various things. It is a
complex system that has the capabilities of sensing information about the environment,
capabilities of collecting physiological measurements, and machine operational data, abilities of
identifying users, animals, other things, and events in an environment; and the capabilities of
processing and communicating these data with other things [1]. Also, it has the capabilities of
converting the data into automated instructions that feedback through the communication
networks to other things with actuating capabilities. These things will in turn actuate other things,
eliminating many human interference roles. Clearly, with such a diverse, complex and
heterogeneous model of the IoT, numerous challenges arise. To realize the unique and futuristic
characteristics of the IoT, management and security of things, should be well thought-out as one
of the fundamental enablers of this technology. There is a need to manage the unprecedented
number of things connected to the Internet that generate a large amount of traffics, particularly
things with low resources. With billions of things equipped with sensors and actuators entering
the digital word using a vast array of technologies, incorporated into devices like lights, electric
appliances, home automation systems and a vast number of other integrated machinery devices,
transport vehicles, and equipment; management of things become a necessity and cumbersome
task.
Towards this aim, this paper reviews some of the significant issues challenging the realization of
the IoT with regards to interoperability, management, security, and privacy. In addition, many of
these challenges have an associated requirement that needs to be considered. This requirement
relates to the nature and capabilities of things. This is because, in general, things in the IoT are
2. International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.2, March 2016
86
characterized as small and lightweight devices that communicate using low-power wireless
technologies such as ZigBee. Therefore, the things’ resources such as memory, processing power,
and battery supply are very limited. This is, in fact, a challenge for the application of many
traditional networking, management and security techniques. This challenge adds another
dimension to the issues raised above. For instance, it is difficult to achieve security on lightweight
things (e.g. parking sensors) compared to traditional computation devices (e.g. a mobile device).
This is due to the fact that it is infeasible to apply traditional security cryptographic-based
techniques on things with low resources with regard to computation and power resources [2].
Also, things or groups of things are often deployed in remote areas or in areas where accessibility
is an issue; which makes changing the things’ batteries a difficult task. As such any computation
activity that might consume a lot of energies or require heavy computation is considered as
unviable. Therefore, addressing these challenges in tandem with the lightweight requirement of
things is essential for the successful deployment and advance of the IoT. The remainder of this
paper discusses interoperability and its different type in the IoT, WSNs integration issues and the
management, security, and privacy issues challenging the IoT.
2. INTEROPERABILITY AND INTEGRATION CHALLENGES
Solutions considering the issues associated with information systems’ interoperability can be
traced back to 1988 [3]; and perhaps even earlier. Wikipedia defines Interoperability as “the
ability to make systems and organizations work together” [4]. The IEEE defines interoperability
as “the ability of two or more systems or components to exchange information and to use the
information that has been exchanged” [5]. Other definitions of interoperability are further tailored
according to the particular application’s requirements or needs. As a result, different categories of
interoperability have been emerging. Technical interoperability [6], Semantic interoperability [7],
Syntactic interoperability [8], and Cross-domain interoperability [9] are examples of these
categories. All these types of interoperability are needed to support seamless and heterogeneous
communications in the IoT. Achieving interoperability is vital for interconnecting multiple things
together across different communication networks. It defeats the purpose to have billions of
sensors, actuators, tiny and smart devices connected to the Internet if these devices can’t actually
communicate with each other in a way or another. In fact, for the IoT to flourish, things
connecting to the communication networks, which can be heterogeneous, need to be able to
communicate with other things or applications.
In traditional computer environments, computer devices are treated equally when connected to
the Internet. Their functionalities vary depending on how the users use them. However, in the
IoT, each device would be subject to different conditions such as power energy consumption
restrictions, communication bandwidth requirements, computation and security capabilities.
Additionally, things could be made by various manufacturers that do not necessarily comply with
a common standard. Things may also operate using a variety of communication technologies.
These technologies do not necessarily connect things to the Internet in the same way a typical
computer device usually do. For instance, 6LoWPAN offers interoperability with other wireless
802.15.4 devices as well as with any IP-based devices using a simple bridging device. However,
an advanced application layer gateway is required to bridge between ZigBee and non-ZigBee
networks [10].
The highly competitive nature of the IoT makes interoperability between things even a more
difficult task to achieve. Besides, wireless communication technologies are evolving and
changing rapidly. This adds to the complexity of creating interoperable communications in the
IoT as well. This inevitability results in heterogeneous devices that cannot communicate with
each other which raise many integration issues in the IoT. Service descriptions, common
3. International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.2, March 2016
87
practices, standards and discovery mechanisms [11] are among the many other challenges that
also need to be considered before enabling interoperable interactions between things.
2.1 Integration issues
The IoT is challenged by fragmented, often unpredictable, deployment of a mixture of devices
(e.g. low-power devices with low capabilities versus more capable devices). This is, in fact,
constitutes a potential barrier to achieving interoperability in the IoT. Additionally, the present
competitive market in the low-power wireless domain, where each organization is trying to push
their standard forward is increasing the risk of non-interoperability between IoT devices creating
integration issues. While it is essential to provide the end-user with more choices of technologies,
certainties should be maintained. This means the IoT requires standards to enable horizontal
platforms that are communicable, operable, and programmable across devices, regardless of their
make, model, manufacturer, or industry applications [12].
Things with sensing capabilities could be in the form of smart objects such as smart building,
smart cars that could incorporate sensing capabilities as part of their designs and functionality, or
simply a tiny wireless sensor. The IoT joins this mixture of devices in a heterogeneous integrated
information system where things are capable to collaborate, communicate and provide services.
Todays’ sensors can monitor temperature, ambiance, soil makeup, pollution in the air, noise,
presence of objects or movements among other actuating functionalities triggered based on some
sensed information. Traditionally, WSNs are built of several "nodes" ranging from a few nodes
up to hundreds or even thousands connected to each other. For example, deploying a large
number of sensors in a given forest can help detecting fires and alerting the authorities and nearby
communities. Thus, integrating things, or group of things, in the form similar to wireless sensors
networks (WSNs) in the IoT is expected to play a significant role in the IoT. However, this might
not be as easy to achieve as it sounds. Integrating WSNs in the IoT, where sensor nodes
dynamically join the Internet, collaborate or communicate with other similar nodes or things open
the door to novel challenges. The next section explores the ways in which WSNs could join the
Internet as part of the IoT.
2.1.1 Network-based Integration
In the Network-based Integration topology, the sensors join the Internet through their network
gateway as shown in Figure 1. In the case of a multi-hop mesh wireless topology, the sensors rely
on a base node, also known as a sink, which even possesses gateway’s capabilities or have a
connection with a gateway. The sensors, in this case, are not directly accessible on the Internet.
Communications between a sensor of a particular WSN and that of another WSN or/and with
other things on the IoT are not going to be direct but via the WSN’s base node.
4. International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.2, March 2016
88
Figure 1- Network Based integration
2.1.2 Independent Integration
In the Independent Integration topology, the sensors can connect directly to the Internet
independently from their base point. As a result, the interaction between an independent sensor
and other things in the IoT can be established without the need to pass by the intermediate node
(i.e. the sink node in the WSN). The topology of such a communication network is given in
Figure 2. However, giving an IP address to every sensor, for the purpose of connecting to the
Internet, may not be the right approach. This is because wireless sensors communications are
generally characterised by their low-cost and low-power features with packets exchanged
periodically and in small sizes [13]. Therefore, it is quite challenging to provide every IoT device
with an IP address to connect to the Internet. This is due to the communication and processing
overheads associated with the use of the TCP protocol that challenges the capabilities of small
and low-cost sensors [14].
Figure 2- Independent integration
2.1.3 Hybrid Integration
Figure 3 shows the “hybrid integration” topology. In this topology, the IoT integrates WSNs
using a mixture of the previously introduced topologies.
5. International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.2, March 2016
89
Figure 3- Hybrid integration
The wireless sensor nodes involved in each of the network topologies presented in Figures 1, 2
and 3 may have different characteristics. Their technical requirements vary from one to another.
For instance, in the Network-based Integration network, the sensors rely on a base node when
connecting to the IoT. The base node possesses more computational, energy and communication
resources when compared with a regular sensor node. A base node connects to the Internet in two
ways:
(1) Basic: the base point provides basic gateway services such as protocol translation services and
routing [15]. It typically forwards the information collected by the WSN’s nodes to a server.
(2) Advanced: In addition to its gateway functionality, the base point has the capabilities of
computing, and performing some data analysis. This can help reducing redundancy in the
network.
Consequently, at least the base node in a WSN requires an IP address to connect to the Internet.
In the case of a Network-based Integration network, there is a need to identify uniquely all the
sensors on the Internet. Traditionally, the Internet is designed around an address-centric scheme
(IP address) as almost all transactions (HTTP, email, etc.) require information about where the
data are hosted [16]. Henceforth, a solution based on globally uniquely identifying things should
be explored. Dynamic address allocation schemes similar to DHCP and translation schemes
similar to DNS need to be exploited as well.
2.2 Other Interoperability Challenges
A typical IoT system has been repetitively described in this paper as a system collecting and
making use of shared data among things. However for a basic communication to occur, a user or
device needs a way to search for things and access the data they produce. This requires an
agreement on many fundamental communication issues such as those relating to how things are
represented, searched and accessed on the Internet [17]. Additionally, there are associated issues
which need to be considered as well. These issues relate to security (authorization, authentication,
trust, integrity, validation, etc.), and privacy including privacy of the users and devices.
Therefore, to achieve interoperability in the IoT, several other associated challenges need to be
considered as well, including the followings:
6. International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.2, March 2016
90
Thing Interaction: As discussed in the previous section, there is more than one option to how
things will interact with other things or the users. There exist situations where interactions with
individual things are needed. On the other hand, there exist situations where the ability to query
and control large groups of things at the same time is also required.
Virtual Representation of Things: How things are represented, and described remains an issue
unsolved or precisely unstandardized. For instance, do we need to establish a shared schema or
ontology for things for greater interoperability? Which attributes should be used to describe
things and how flexible and unified this descriptor system should be? Can we find appropriate
ways to involve users in connecting things and resolving ambiguities based on their current
operation or context? [17].
Searching, Finding and Accessing Things: How do we search for things on the Internet? Should
we be able to search for things by their unique ID, IP, location, name or/and in combination with
other properties? How can we discover, search, locate or track mobile things that may move from
one location or network to another? How should things be organized, deployed, managed and
secured?
Syntactic Interoperability between Things: Recall that syntactic interoperability deals with the
packaging and transmission mechanisms for data over a network. Thus, when all the above
challenges are addressed, there will still be a need to ensure that data flow is interoperable
between the various networks and among a mixture of devices. Translation functionalities in
networks or in some devices, gateways or in the form of middleware sitting on the edge of a
network are most likely needed.
3. MANAGEMENT CHALLENGES
Traditionally, network management solutions are needed to manage network equipment, devices,
and services. However, with the IoT, there is a need to manage not only the traditional networked
devices and their services, but also an entirely new range of things. The enormous number of
things and their diversity create many management requirements. Thus, traditional management
functionalities such as remote control, monitoring and maintenance are considered of paramount
significance for the operation of things in the IoT. However, these management capabilities need
to evolve to cater for the unique characteristics of the IoT. This is because the IoT is of a diverse
nature supporting heterogeneous communications and seamless machine to machine interactions.
This is in addition to the specific management capabilities required for managing things in the
IoT. For example, self-configuration and network reconfiguration are essential management
requirements in the IoT. On the other hand, traditionally, network management solutions aimed at
providing management information within a minimal response time. However, in some IoT
scenarios which might involve lightweight devices, management solutions should provide
comprehensive management information with minimal energy use [18].
Nevertheless, the characteristics of data generated in the IoT are distinct from other data in use
today [19]. For instance in [20], IoT data have been described as having five distinct
characteristics: Heterogeneity, Inaccuracy of sensed data, Scalability and Semantics. We add
minimal or constrained as another important feature governing data in the IoT as, generally,
things in the IoT have limited computation, communication, and power resources at their
disposal. Additionally, in the context of IoT, data management systems must summarize data
online from multiple heterogeneous sources while providing storage, logging, and auditing
facilities for offline analysis [21, 22]. Therefore, management functionalities are needed to allow
managers to perform many maintenance tasks remotely over the Internet and possibly across
many heterogeneous interconnected networks. Such management capabilities help in reducing
7. International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.2, March 2016
91
errors and accelerating response time. The ability to turn things on and off, disconnecting things
from specific networks, and monitoring the statuses of things are amongst the important tasks that
a management system should support. On the other hand, having a management system deployed
in an IoT network helps in eliminating travel’s and staff training’s costs. Also, it helps in
accelerating the response to failure events. For example, a management system that supports the
remote monitoring, via the Internet, of sensors and other smart devices deployed in remote
locations or a busy city is highly beneficial and essential in emergency applications [23]. Such a
system allows managers to remotely control, diagnose errors, and troubleshoot IoT devices in real
time, reducing costs and accelerating many maintenance tasks.
Furthermore, the magnitude of network connections and data associated with the IoT poses
additional challenges in terms of data and service management. These challenges relate to data
collection and aggregation, provisioning of services and control as well as monitoring the
performance of things. Thus, performance becomes significant in IoT applications that deploy
things in remote locations where accessibility is an issue. Performance is also considered
important in emergency applications where failure can be catastrophic. Thus, management
solutions should provide the capabilities needed to monitor the performance of things and the IoT
network as well. Performance statistics relating to response time, availability, up and down time,
and others are also highly advantageous. Other performance requirements relate to things’
hardware. This is because, providing insights into the health of things, and their networks are an
important performance activity. For instance, monitoring and reporting the change in things’ state
(e.g. the status of an actuator whether it is running or no), the ambience’s temperature, hardware’s
temperature, battery levels, among others, are necessary for the overall management of things in
the IoT. Table 1 describes the major management issues challenging the IoT.
Table 1- Management issues
Configuration
Management
• How things are setup and by whom?
• Network connectivity
• Self-configuration capability.
• Asynchronous Transaction Support.
• Network reconfiguration.
Things’
control
Management issues including turning things on and off, disconnecting things
from specific networks and connecting to other. To effectively control a
thing, a prior knowledge of the thing’s status is required. Therefore, “Things’
control” complements “monitoring of things.”
Monitoring It is essential for the operation and control of things to know the status of
things e.g. running, listening, down, sleep mode, etc. Therefore, once things
are deployed and in use, there should be a way to monitor their statuses.
These are in addition to:
• Network status monitoring
• Network topology discovery.
• Notification.
• Logging.
Things’
maintenance:
Detecting the failure of a thing is important, specifically in an IoT network
which might involve a larger number of things. A tool or software is required
for detecting and addressing things’ failure. Other issues relate to the general
maintenance tasks of things e.g. software update, patch update, protocols
version detections, etc.
Things’
performance
Monitoring the performance of things is needed so sign of stress can be
detected before the occurrence of any failure. This is significant for things
that might be deployed in remote locations, and essential in emergency
8. International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.2, March 2016
92
applications [23], where availability and other QoS parameters are of high
importance.
Things’
security and
privacy
There are basic security challenges such as authorization, authentication and
access control that need to be addressed. Security bootstrapping mechanisms
are also required. Other security issues are associated with things-to-things
communications. For instance, if things are to be accessed by applications or
software independently from the human users, then there are security
measures that need to be enforced to ensure that things are not leaking
information and disclosing private information to unauthorized things or
used miscellaneously. Things have their users and owners. Thus privacy is
vital as well [24].
Energy
Management
• Management of energy resources.
• Statistics on energy levels, e.g. estimated lifespan.
4. SECURITY CHALLENGES
The growth in the number of connected devices to the communication networks in the IoT
translates into increased security risks and poses new challenges to security. A device which
connects to the Internet, whether it is a constraint or smart device, inherits the security risks of
today’s computer devices. Almost all security challenges are found in the IoT. Hence, some
fundamental security requirements in the IoT such as authorization, authentication,
confidentiality, trust, and data security need to be considered.
Therefore, things should be securely connected to their designated network(s), firmly controlled
and accessed by authorized entities. Data generated by things need to be collected, analysed,
stored, dispatched and always presented in a secure manner. Nevertheless, there are security risks
associated with things-to-things communications as well. This is in addition to the risks relating
to things-to-person communications. For instance, if things are to be accessed by things
independently from the human users, then there are security measures that need to be enforced.
These security measures are necessary to ensure that things are accessed only by authorized
entities in a secure manner. Also, they need to ensure that things are not leaking information or
disclosing private information to unauthorized things and users, or used miscellaneously.
4.1. The Inherited Security Challenges in the IoT
The IoT can be regarded as the Internet 2.0 or the future Internet. Thus, the IoT is not another
form of communications or networks running in parallel with what we now today as the Internet;
but indeed an expansion of it. Therefore, the IoT inherits today’s Internet security issues and
poses some new ones as well. Figure 4 shows the security issues inherited and challenging the
IoT. These security issues are discussed in the followings sub-sections.
4.1.1. End-to-End Security
Cisco defines end-to-end security as an absolute requirement for secure communications [25]. It
is the process of protecting the communications and data exchanged between both ends of the
communication without being read, eavesdropped, intercepted, modified, or tampered. In the IoT,
end-to-end security remains an open challenge for many IoT devices and applications. The nature
of the IoT with its heterogeneous architecture and devices involve the sharing of information and
collaboration between things across many networks. This poses serious challenges to the end-to-
end security. When devices have different characteristics and operate using a variety of
communication technologies (802.11 vs. 802.15.4), establishing secure sessions and secure
communications, become a very complex task to achieve.
9. International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.2, March 2016
93
Additionally, not all devices in the IoT are equal. Currently, computers, smartphones, and other
computerized devices connect to the Internet via HTTP, SMTP and the like for most of their
activities. As such TLS and IPsec protocols are usually used to negotiate dynamically the session
keys, and to provide the required security functions. However, some of the devices in the IoT do
not possess the ability to run TLS and IPsec protocols due to their limited computation and power
capabilities. Additionally, some embedded devices in the IoT have limited connectivity as such
they may not necessarily use HTTP or even IP for the communications (e.g. a sensor in a WSN).
Figure 4- Some IoT security issues
10. International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.2, March 2016
94
4.1.2. Data Security
Data security involves the protection of data during communications and storages. In [26], data
security is defined as the process of protecting data from destructive forces or from unauthorized
access. Data security, also referred to as information security, is vital to the IoT security. Data
security in the IoT is also associated with safety. Usually, the impact of data security breaches on
the human life remained within the scope of hacking the personal information of an individual or
getting unauthorised access to sensitive information such as financial data. However, data
security breaches in the IoT could pose a serious threat to humans’ safety. For instance, the
accidental intrusion or malicious access that could interfere or interrupt the operations of a
driverless car or a heart pacemaker will threaten the user’s life. Security breaches in an IoT forest
fire detection system could lead to catastrophic results as well.
4.1.3. Identity and Access Management
Identity theft, forgery, and masquerading among other security attacks are some of the security
issues challenging the protection of identity in the IoT. As we have seen in section 3.2, things
identifiers remains an unresolved issue in the IoT. How things are identified, represented,
searched, and accessed in the IoT is still unknown. This is indeed make things vulnerable to many
identity attacks. For instance, a device in the IoT could uses a fake identity to gain unauthorized
access to services provided by another IoT device. This type of attack is known as the
masquerade attack. Typically, computer devices employ secure mechanisms that rely on complex
algorithms in detecting suspicious access to data and detect imposters. The IoT is vulnerable to
several identity attacks including Spoofing, Masquerade, MiM and Smurf attacks as well. Thus,
several existent traditional security solutions need to be studied and examined to determine their
feasibility and applicability in the IoT.
4.1.4. Compliance
Complying with government laws and industry regulations plays an important role in preserving
the security of IoT systems. Things in the IoT need to adhere to several data protection laws and
privacy acts. Privacy in the IoT requires special considerations as well. This is because the IoT is
built around autonomous communications between things. Therefore, there is a need to ensure
privacy at all time. Initially, privacy requirements can be summarized to three key concepts:
1. User consent: the user needs to be able to provide an informed consent on the usage of their
data
2. Freedom of choice: the user should have the freedom of opting in and out from being
involved or being part of a communication
3. Anonymity: the user has the right to remain anonymous when obtaining services that do not
require identity verification or the like.
4.1.5. Access Control
Access control is the process of granting, limiting or restricting access to a resource. It regulates
who or what can view or use resources. Role based access control (RBAC) is an example of a
widely used access control model. Access control in the IoT is discussed in more details in a
subsequent section. Henceforth, as illustrated in Figure 4, in addition to the security issues
inherited from the traditional Internet, the IoT has a set of specific and new security problems.
These security issues are derived from the dynamic IoT network structure, the different type of
communications involved, and the low-cost characteristic of the IoT devices among other factors
which are exclusively associated with the IoT. Significantly, these security issues cannot be
solved with traditional Internet security solutions. This is due to the fact that IoT
11. International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.2, March 2016
95
communications’ architectures differ from those of the traditional Internet. As the IoT evolves
and becomes more complex, the security issues increase in complexity as well. This increase in
complexity can be attributed to two fundamental IoT factors: low-cost and heterogeneity.
With regard to low-cost, some IoT devices should be available at relatively low prices. The low-
cost of things is a significant factor that drives the support for large-scale deployment of things in
the IoT. However, this low-cost requirement dictates that things are mostly resource constrained.
This translates into devices with lower computational capabilities, limited amount of memory and
power supply. This is, in fact, constitute an obstacle for the application of many traditional
cryptographic-based solutions. Given that traditional public-key infrastructures cannot
accommodate the IoT [27]. For instance, the adoption of many traditional and basic Internet
security solutions such as PKI and CA increases the cost of the IoT devices.
As of heterogeneity, the diversity of devices and communications in the IoT produce many new
security challenges as well. For instance, the integration of WSNs into the Internet, as part of the
IoT, creates new security problems. These security problems are derived from the process of
connecting a sensor node with an Internet device. For example, low-cost and constrained devices
that use low-power communication technologies, such as ZigBee or IEEE 802.11ah, need to
establish a secure communication channel with more capable devices such as a smartphone. Thus,
securing this communication channel requires the use of adequate cryptographic and key
management solutions without consuming a lot of bandwidth and energy. This is in addition to
the need to employ security protocols which securely connect these devices to the Internet. Add
another essential security requirement, such as the need to authorize the devices involved in the
communications, and the degree of achieving security for this simple communication scenario
increases in complexity. In [28], the authors analyzed some of the major security issues
challenging the IoT, which lead to the proposition of some key technologies based on access
control and user authentication. Similar works proposed solutions based on the key management
architecture such as in [29]. While in [30], protecting the privacy of information in the IoT was
the focus of the proposed architecture. However, these contributions are still in design stage as
such the details of the protocols and their implementations are missing.
Consequently, given that the IoT merges the traditional Internet, WSNs, PANs, Low-Power
wireless networks and many other evolving networks together, the current Internet security
solutions can be used to provide some security for the IoT. However, conventional Internet
security technologies cannot provide a complete security solution for the IoT. The heterogeneity
of devices and the multi-networks integration characteristic of the IoT in addition to the limited
capabilities and low-cost requirement of some IoT devices create a new set of IoT own security
problems. We will discusses in more details some of the IoT new security issues.
4.1.6. Physical and DoS Security Risks
Traditionally, network equipment require the protection against physical attacks and against
unauthorized accesses e.g. the storage of routers in secure cabinets. In the IoT, many IoT devices
require similar protection measures against physical or unauthorized attacks. Hence,
strengthening the physical security of things is essential in many IoT applications. The IoT is
vulnerable to the Denial of Service (DoS) attack as well. Typically, a DoS attack floods a given
server with false requests for services. Thus, it prevents legitimate requesters from accessing the
server’s services [31]. It attempts to exhaust the computational resources of the server. The IoT
vulnerability to the DoS attack is not only limited to things which connect to the Internet directly,
but also extend to WSNs. We have seen in Section 3.2 that nodes in a WSN connect to the
Internet eventually, despite the topology used in the network. Therefore, WSNs cannot escape
DoS attacks [32]. Additionally, the heterogeneous nature and complexity of communications
envisioned in the IoT, makes the IoT vulnerable to the distributed denial of service (DDoS)
12. International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.2, March 2016
96
attack. A DDoS is a DoS attack made by multiple agents in the network and from various
locations [33]. Therefore, disruptive attacks such as the DoS and DDoS attacks are a serious
potential risk to the IoT. Many IoT devices have limited processing capabilities and memory
constraints. Therefore, DDoS attacks can easily exhaust their resources. Also, in things- to-things
communications, DoS attacks can prove to be difficult to notice before the disruption of the
service which could generally be attributed to battery exhaustion [34].
As a DoS countermeasure, many protocols such as DTLS, IKEv2, HIP, and Diet HIP, verifies the
address of the initiating host before responding to requests [34]. Other DoS resistance methods
rely on clustering techniques for detecting DoS attacks in WSNs. For example, the work in [35],
utilizes a hierarchical clustering technique which detect abnormal behavior inside a cluster by
analyzing the traffic on the network using an elected node. Other solutions are centered on the
design of intrusion detection system (IDS) such as the one developed specifically to work with
WSNs in [36]. SVELTE [37] is designed for 6Lowpan networks and aims to protect against
routing attacks as well [37]. For further readings on the defense mechanisms available against
DDoS attacks, the reader is referred to [38]. However, it should be noted that the practical
implementations and performance of these methods in the IoT are yet to be explored and
evaluated.
4.2 IoT New Security Challenges
Authorization, authentication, integrity, trust and confidentiality are all fundamental aspects of
security which need to be addressed in the IoT. However, securing the IoT communications is
challenged by the lack of a shared infrastructure and common security standards. This is, in fact,
poses many new security issues which are by far more complicated than those found in any
existing networking systems. Table 2 summarizes some of these security requirements:
Table 2- IoT Security Requirements
Authorization For smart IoT devices, this requirement can be satisfied using traditional
authorization techniques. For constrained devices and in low-power
wireless networks, such as ZigBee IP, unauthorized access to the IoT
devices should be blocked at the coordinator. That’s unauthorized requests
should not even be routed to the IoT devices as this may exhaust their
energy.
Authentication Authentication simply means verifying that "you are who you are claiming
to be". This is usually done using a username and password based
authentication system. However, this system is not secure enough.
Passwords usually require frequent changing and it cannot be used with
unattended devices. Also, the Secure Sockets Layer protocol (SSL) is used
for authentication. (Mainly, a web browser authenticates web sites using
SSL). Authentication also include the process of authenticating both the
sender and receiver where they are able to verify the origin of the
exchanged messages. This is a complicated security requirement in the
IoT. This is because things might not necessarily have IP addresses.
Integrity and
Freshness
Message integrity is about ensuring a message hasn’t been altered. This is
extremely important in the IoT as many applications rely on information
supplied by things to change the statuses of other things. Freshness is also
vital for ensuring that no older messages are replayed.
Confidentiality Protecting personal and sensitive data from being accessed by
unauthorized entities in lightweight devices in the IoT is a challenging
task.
13. International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.2, March 2016
97
4.2.1. Access Control in the IoT
Role Based Access Control (RBAC) is a widely adopted access control approach that restricts
access to systems or resources to authorized users. RBAC is based on the concept of assigning
permissions to roles. For example, within a healthcare organization, roles are created for various
job functions such as a nurse and a doctor. The permissions to perform certain operations in a
system are assigned to specific roles. Medical staff (or other system users) are assigned to a
particular roles. Through these role assignments, the staff acquire the permissions to perform
particular system functions. Since users are not assigned permissions directly, but only acquire
them through their roles, management of individual users’ privileges becomes a matter of simply
assigning an appropriate role to the user. This simplifies common operations, such as adding a
user or changing a user's role within a department.
However, in the IoT, things and users might require to access data anytime, anywhere, from
various types of devices, including mobile things (things on the move). Therefore, the IoT poses
new challenges to access control. In fact, the low power requirements of things, limited
bandwidth, heterogeneity of communications and the large scale of devices in the IoT create a
unique set of access control requirements. Thus, traditional access control systems in their current
status, such as RBAC, might not work efficiently in the IoT. Classically, the advantage of using
RBAC in a system is the ability of easily adding access rights to a user, as long as it uses existing
roles. In the IoT, as the number of connected devices and networks grow, the number of users and
devices requesting access to data and services grow as well. Therefore, an IoT system that
comprises thousands of devices would perhaps ends up with thousands of roles and permissions
that need to be maintained. Therefore, the challenge of managing access control to thousands of
devices in the IoT will be simply transformed into a complex task that requires the management
of a vast number of roles. This is known as “role explosion” and it is a major drawback of RBAC.
This is because adding new roles to a system require a system-wide update. Generally, RBAC
systems are implemented in a centralized architecture whereas an access control server assigns
roles to users and grants them access to resources. Thus, updates at the system level are even
harder to implement in the IoT given its distributed architecture.
Attribute based access control (ABAC) is an access control model that abstract identity, role, and
resources information of the traditional access control into entity attributes [39]. ABAC grants
accesses to services based on the attributes possessed by the requester [40]. Therefore, unlike
RBAC, the ABAC model uses attributes to describe requesters and the requested services. The
associated attributes of each entity can be defined according to the system needs [41]. Relying on
attributes provides a much more fine-grained access control approach. As such access control
strategies can be designed to use not only the requester’ attributes but also other contextual data
e.g. the location of the requester. Therefore, rather than grating or denying access to a resource
based on the role of a user, ABAC combines together the user’s attributes along with other
contextual information which provide a way of dynamically generating context aware decisions
for requests [42]. This makes ABAC suitable for adoption in systems that require fine grained
access control such as the IoT. Additionally, ABAC better adapts to the access control
requirements in the IoT including the dynamic expansion of large scale users and things. The
advantages of using ABAC in the IoT can be summarized to as follows:
• Data minimization: ABAC uses attributes to identify requesters. Significantly, resources are
also represented using an attributes schema. Therefore, ABAC can be used to provide access
only to the personal data required for the provision of a request to a service. This concept is
known as data minimization
• Privacy enhancement: ABAC supports data minimization. This allows an organization to
better design privacy statements where only the required data are specified.
14. International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.2, March 2016
98
• Policy driven decisions: Access decisions to resources are managed via policies rather than
by individuals.
• Dynamic: Access decisions are made during runtime since they use context information as
well. Example: let’s assume there is exist a policy that grants access to a specific resource
only to requesters located in Sydney. Therefore, the system during runtime will need to check
the location of the requester before making an access decision.
• Flexibility: Access decisions are associated with access policies rather roles. This allows the
system to be more flexible in designing policies according to needs. This is because
permissions are no longer bound to roles as in the RBAC. Instead, RBAC allows policies’
customizations that leverage accesses to resources. This feature of RBAC enables owners or
administrators to apply access control policies on things without the need to acquire a prior
knowledge on the requester(s). For example, when a new device joins a system, there will be
no need for the rules or policies to be modified. As long as the new device is assigned the
attributes necessary for accessing the required resources. Therefore, the ability of
accommodating external entities is one of the primary benefits of using ABAC in the IoT.
ABAC rules can evaluate attributes of a subject and resources that are not necessary
inventoried in the authorization system as well.
• Fine grained: ABAC rules can be fine-grained and contextual.
Consequently, ABAC is a promising access control technology for the IoT. Many researches have
started to explore the benefits of using ABAC for managing access control to things and
resources in the IoT. For instance the work in [39], proposes an authentication method based on
ABAC for the IoT. In [43], the authors highlight the importance of using ABAC in the IoT and
Big Data. They provide application examples of ABAC. Also, the study discusses some potential
IoT applications where ABAC can be used to provide access control. For example, airlines,
financial sectors, exporters, hospitals, among other organizations are described as possible IoT
applications that could benefit from the use ABAC in managing access control. For instance in
the health sector, the study points out that from a patient perspective ABAC can be used to
effectively collect users’ consent for the management of patients’ EHRs. Moreover, an access
control solution based on ABAC policy can be used to provide patients with a granular capability
allowing them to manage their personal information [43].
5. PRIVACY CHALLENGES
The IoT highly distributed nature of technologies, such as embedded devices in public areas,
create weak links that malicious entities can exploit and can as well open the door for a mass
surveillance, tracing, tracking, and profiling of the users’ movements and activities [44].
Nowadays, the proliferation of mobile devices, GPS systems and other evolving technologies into
our lives has introduced several privacy threats. For instance, the study in [45] showed that a
driver’s home location can be inferred from the GPS data collected from his vehicle even if the
location information was anonymized. It further shows that the reconstruction of an individual’s
route could provide a detailed movement profile that allows for inferences. For example,
recurring visits to a medical clinic could indicate illness and visits to activist organizations could
hint at political opinion. Other studies such as [46] reported some privacy incidents from the use
of mobile applications on the Android, Blackberry, iPhone, and Windows Phone platforms. Thus,
it is most likely that privacy incidents will grow rapidly with the increase in penetration of the
IoT in our daily life.
Therefore, privacy is one of the major implications as the Internet of Things develops. Privacy no
longer means anonymity in the IoT. Profiling and data mining within any IoT scenario can form a
potential harm to individuals due to the automatic process of data collection, their storage and the
way personal data can be easily shared and analyzed. One of the promising features of the IoT is
15. International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.2, March 2016
99
the ability of devices to observe and sense their environments. Thus, attackers may configure
devices to join a given IoT system or network for the purpose of miscellaneously collecting
information about the system environment and the user. The most serious concern with things in
the IoT is their ability to initiate, by themselves, exchange of information with each other’s.
Smart devices such as smart home appliances, smart cars and others that log data about their
environment, e.g., their locations, constitute a source of risks and vulnerabilities, with regard to
privacy, to their owners. If these devices are connected together, as envisioned in the IoT, and
these logs are shared among IoT applications, then there is an increased risk of personal
information leakage which threaten the users’ privacy.
6. CONCLUDING REMARKS
In the early days of the Internet which was basically centered on computers, a network of
networks was the term used to define the Internet. In the IoT, it seems everything is going to be
connected, pants, shoes, shirts, fridges, glasses, washing machines, plants, dogs, cars, airplanes,
cities, you name it. Yet, the term network of networks can still be used to define the IoT.
However, what’s new is that connected networks are no longer limited to IP connected
devices/networks in the fashion that we know today. Instead, there are islands of networks
connecting using various network technologies. This paper reviewed some of the major
challenges facing the IoT. Today, the majority of IoT devices are connected to a mobile phone
application. To get anything done, the user has to administer an array of applications in addition
to jumping from an application to another in order to control what should be a smart device. We
are at risk of creating remote islands of IoT technologies instead of achieving a true vision of IoT.
The IoT has the potential of shaping the way we consume energy, improve resources efficiency
such as food and water, and support assisted living, access to healthcare, and so much more by
connecting different applications together. Therefore, for the realization of a true vision of the
IoT, major challenges such as achieving interoperability between the various IoT enabling
technologies and devices were identified in this research. Additionally, the main challenge is not
only in simply building an IoT system that connects various IoT devices together, but in
maintaining scalable, private, secure and trustworthy operations on the IoT. Consequently, it is
concluded that there is a need to accommodate the differences in technologies across the various
areas of the IoT.
For the future advancement of the IoT, it is therefore imperative to develop a multifaceted
technology approach to IoT security, interoperability, management and privacy. The
internetworking mechanisms of things, WSNs and traditional computer devices in the IoT are
vital with respect to standardizing the communications on the Internet. It is also crucial to have
lightweight, scalable and adaptive security solutions in place to secure the users’ information and
preserve their privacy in the IoT.
ACKNOWLEDGEMENTS
This research is supported by the International Postgraduate Research Scholarship (IPRS) and the
Australian Postgraduate Award (APA).
16. International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.2, March 2016
100
REFERENCES
[1] M. Elkhodr, S. Shahrestani, and H. Cheung, "A Semantic Obfuscation Technique for the Internet
of Things," in IEEE International Conference on Communications (ICC), Sydney, Australia,
2014, pp. 448 - 453.
[2] L. Atzori, A. Iera, and G. Morabito, "The Internet of Things: A survey," Computer Networks, vol.
54, pp. 2787-2805, 2010.
[3] H. y. D. o. C. Science, F. Eliassen, and J. Veijalainen, A functional approach to information
system interoperability, 1988.
[4] Wikipedia. Interoperability. Available: https://en.wikipedia.org/wiki/Interoperability
[5] "IEEE Standard Computer Dictionary: A Compilation of IEEE Standard Computer Glossaries,"
IEEE Std 610, pp. 1-217, 1991.
[6] H. van der Veer and A. Wiles, "Achieving technical interoperability," European
Telecommunications Standards Institute, 2008.
[7] (2011). Semantic interoperability of health information Available:
http://www.en13606.org/the-ceniso-en13606-standard/semantic-interoperability
[8] A. E. Andargoli, P. Bernus, and H. Kandjani, "Analysis of Interoperability in the Queensland
Disaster Management System," in ICEIS (3), 2013, pp. 310-317.
[9] (2015). Cross-Domain Interoperability. Available: https://www.ncoic.org/cross-domain-
interoperability
[10] J. Sarto. ZigBee VS 6LoWPAN for Sensor Networks. Available: https://www.lsr.com/white-
papers/zigbee-vs-6lowpan-for-sensor-networks
[11] (10/07/2010). Available: http://www.hybus.net/lan_english/index.htm
[12] J. Groopman. (2014) Interoperability: The Biggest Challenge Facing Mass Consumerization of
Internet of Things. Altimeter. Available: http://www.altimetergroup.com/2014/02/interoperability-
the-challenge-facing-the-internet-of-things/
[13] S. Kumar, M. Bhardwaj, and A. Q. Bhat, "Study of Wireless Sensor Networks its Routing
Challenges and Available Sensor Nodes," in International Journal of Engineering Research and
Technology, 2013.
[14] C. H. Liu, B. Yang, and T. Liu, "Efficient naming, addressing and profile services in Internet-of-
Things sensory environments," Ad Hoc Networks, vol. 18, pp. 85-101, 7// 2014.
[15] Q. Zhu, R. Wang, Q. Chen, Y. Liu, and W. Qin, "Iot gateway: Bridgingwireless sensor networks
into internet of things," in 2010 IEEE/IFIP 8th International Conference on Embedded and
Ubiquitous Computing (EUC), 2010, pp. 347-352.
[16] R. R. Kujur and A. Dwivedi, "Exploration of Existing Frameworks for Connecting Wireless
Sensor Networks (WSNs) with Current Internet," International Journal of Computer Applications,
vol. 86, 2014.
[17] M. Blackstock and R. Lea, "Toward interoperability in a web of things," in Proceedings of the
2013 ACM conference on Pervasive and ubiquitous computing adjunct publication, 2013, pp.
1565-1574.
[18] M. Welsh and G. Mainland, "Programming Sensor Networks Using Abstract Regions," in NSDI,
2004, pp. 3-3.
[19] Y.-K. Chen, "Challenges and opportunities of internet of things," in 2012 17th Asia and South
Pacific Design Automation Conference (ASP-DAC), 2012, pp. 383-388.
[20] C. C. Aggarwal, N. Ashish, and A. Sheth, "The internet of things: A survey from the data-centric
perspective," in Managing and mining sensor data, ed: Springer, 2013, pp. 383-428.
[21] N. A. Ali and M. Abu-Elkheir, "Data management for the internet of things: Green directions," in
Globecom Workshops (GC Wkshps), 2012, pp. 386-390.
[22] M. Chui, M. Löffler, and R. Roberts, "The internet of things," McKinsey Quarterly, vol. 2, pp. 1-9,
2010.
[23] L. Yang, S. Yang, and L. Plotnick, "How the internet of things technology enhances emergency
response operations," Technological Forecasting and Social Change, vol. 80, pp. 1854-1867,
2013.
[24] M. Elkhodr, S. Shahrestani, and H. Cheung, "A Review of Mobile Location Privacy in the Internet
of Things," in 2012 Tenth International Conference on ICT and Knowledge Engineering,
Bangkok, Thailand, 2012, pp. 266-272.
[25] M. H. Behringer, "End-to-End Security," The Internet Protocol Journal, vol. 12, p. 20, 2009.
17. International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.2, March 2016
101
[26] G. Summers, "Data and databases," Koehne, H Developing Databases with Access: Nelson
Australia Pty Limited, pp. 4-5, 2004.
[27] R. Roman, P. Najera, and J. Lopez, "Securing the Internet of Things," Computer, vol. 44, pp. 51-
58, 2011.
[28] H. Suo, J. Wan, C. Zou, and J. Liu, "Security in the internet of things: a review," in 2012
International Conference onComputer Science and Electronics Engineering (ICCSEE),, 2012, pp.
648-651.
[29] R. Roman, C. Alcaraz, J. Lopez, and N. Sklavos, "Key management systems for sensor networks
in the context of the Internet of Things," Computers & Electrical Engineering, vol. 37, pp. 147-
159, 2011.
[30] C. Doukas and I. Maglogiannis, "Bringing IoT and cloud computing towards pervasive
healthcare," presented at the Sixth International Conference on Innovative Mobile and Internet
Services in Ubiquitous Computing (IMIS), Palermo, Italy, 2012.
[31] J. Mirkovic and P. Reiher, "A taxonomy of DDoS attack and DDoS defense mechanisms," ACM
SIGCOMM Computer Communication Review, vol. 34, pp. 39-53, 2004.
[32] G. Gang, L. Zeyong, and J. Jun, "Internet of things security analysis," in 2011 International
Conference on Internet Technology and Applications (iTAP), 2011, pp. 1-4.
[33] S. Misra, P. V. Krishna, H. Agarwal, A. Saxena, and M. S. Obaidat, "A learning automata based
solution for preventing distributed denial of service in Internet of things," in 2011 International
Conference on and 4th International Conference on Cyber, Physical and Social Computing, 2011,
pp. 114-122.
[34] T. Heer, O. Garcia-Morchon, R. Hummen, S. L. Keoh, S. S. Kumar, and K. Wehrle, "Security
Challenges in the IP-based Internet of Things," Wireless Personal Communications, vol. 61, pp.
527-542, 2011.
[35] D. Mansouri, L. Mokdad, J. Ben-Othman, and M. Ioualalen, "Detecting DoS attacks in WSN
based on clustering technique," in Wireless Communications and Networking Conference
(WCNC), 2013, pp. 2214-2219.
[36] D. Martynov, J. Roman, S. Vaidya, and H. Fu, "Design and implementation of an intrusion
detection system for wireless sensor networks," in IEEE International Conference on
Electro/Information Technology, 2007, pp. 507-512.
[37] S. Raza, L. Wallgren, and T. Voigt, "SVELTE: Real-time intrusion detection in the Internet of
Things," Ad hoc networks, vol. 11, pp. 2661-2674, 2013.
[38] S. T. Zargar, J. Joshi, and D. Tipper, "A survey of defense mechanisms against distributed denial
of service (DDoS) flooding attacks," IEEE Communications Surveys & Tutorials, vol. 15, pp.
2046-2069, 2013.
[39] N. Ye, Y. Zhu, R.-C. Wang, R. Malekian, and L. Qiao-min, "An Efficient Authentication and
Access Control Scheme for Perception Layer of Internet of Things," Applied Mathematics &
Information Sciences, vol. 8, pp. 1617-1624, Jul 2014 2014-03-22 2014.
[40] L. Wang, D. Wijesekera, and S. Jajodia, "A logic-based framework for attribute based access
control," presented at the ACM workshop on Formal methods in security engineering, NY, USA,
2004.
[41] Q. Han and J. Li, "An authorization management approach in the internet of things," Journal of
Information & Computational Science, vol. 9, pp. 1705-1713, 2012.
[42] D. R. Kuhn, E. J. Coyne, and T. R. Weil, "Adding attributes to role-based access control,"
Computer, pp. 79-81, 2010.
[43] A. Cavoukian, M. Chibba, G. Williamson, and A. Ferguson, "The Importance of ABAC:
Attribute-Based Access Control to Big Data: Privacy and Context," The Privacy and Big Data
Institute, Canada2015.
[44] M. Elkhodr, S. Shahrestani, and H. Cheung, "The Internet of Things: Vision & Challenges," in
IEEE Tencon Spring 2013, Sydney, Australia, 2013, pp. 218 - 222.
[45] B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, "Enhancing security and privacy in traffic-
monitoring systems," IEEE Pervasive Computing, vol. 5, pp. 38-46, 2006.
[46] M. Elkhodr, S. Shahrestani, and H. Cheung, "A Review of Mobile Location Privacy in the Internet
of Things," in IEEE Tenth International Conference on ICT and Knowledge Engineering,
Bangkok, Thailand, 2012, pp. 266-272.
18. International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.2, March 2016
102
AUTHORS
Mahmoud Elkhodr is with the School of Computing, Engineering and Mathematics
at Western Sydney University (Western), Australia. He has been awarded the
International Postgraduate Research Scholarship (IPRS) and Australian
Postgraduate Award (APA) in 2012-2015. Mahmoud has been awarded the High
Achieving Graduate Award in 2011 as well. His research interests include: Internet
of Things, e-health, Human Computer-Interactions, Security and Privacy.
Dr. Seyed Shahrestani completed his PhD degree in Electrical and Information
Engineering at the University of Sydney. He joined Western Sydney University
(Western) in 1999, where he is currently a Senior Lecturer. He is also the head of
the Networking, Security and Cloud Research (NSCR) group at Western. His main
teaching and research interests include: computer networking, management and
security of networked systems, analysis, control and management of complex
systems, artificial intelligence applications, and health ICT. He is also highly active
in higher degree research training supervision, with successful results.
Dr. Hon Cheung graduated from The University of Western Australia in 1984 with
First Class Honours in Electrical Engineering. He received his PhD degree from
the same university in 1988. He was a lecturer in the Department of Electronic
Engineering, Hong Kong Polytechnic from 1988 to 1990. From 1990 to 1999, he
was a lecturer in Computer Engineering at Edith Cowan University, Western
Australia. He has been a senior lecturer in Computing at Western Sydney
University since 2000. Dr Cheung has research experience in a number of areas,
including conventional methods in artificial intelligence, fuzzy sets, artificial
neural networks, digital signal processing, image processing, network security and
forensics, and communications and networking. In the area of teaching, Dr Cheung
has experience in development and delivery of a relative large number of subjects
in computer science, electrical and electronic engineering, computer engineering
and networking.