Abstract
Year by year the solutions associated with the idea of Internet of Things (IoT) gaining in popularity. Internet of Things is a term describing the concepts of network connections between objects that may directly or indirectly collect, process and exchange data via computer networks. It is important to establish new standards of data management as well as create mobile and IoT applications extending the functionalities of IoT systems to enable the users to benefit from the newest technological advances. Addressing these tendencies the paper presents some sensitivities of mobile applications that could compromise the safety of IoT and several methods of dealing with these problems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
McEwen, A., Cassimally, H.: Designing the Internet of Things. Wiley, Chichester (2014)
da Costa, F.: Rethinking the Internet of Things. A Scalable Approach to Connecting Everything. Apress Open, Berkely (2013)
An Introduction to the Internet of Things (IoT). http://www.lopezresearch.com/
Arsénio, A., Serra, H., Francisco, R., Nabais, F., Andrade, J., Serrano, E.: Internet of intelligent things: bringing artificial intelligence into things and communication networks. In: Xhafa, F., Bessis, N. (eds.) Inter-cooperative Collective Intelligence: Techniques and Applications. Studies in Computational Intelligence, vol. 495, pp. 1–37. Springer, Heidelberg (2014). doi:10.1007/978-3-642-35016-0_1
Ruggieri, M., Nikookar, H., Vermesan, O., Friess, P.: Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems. River Publishers, Aalborg (2013)
Gartner: Gartner Says 4.9 Billion Connected “Things” Will Be in Use in 2015 (2014). http://www.gartner.com/newsroom/id/2905717
Devito, M.: A security assessment of Z-Wave devices and replay attack vulnerability (2016). https://www.sans.org/reading-room/whitepapers/internet/security-assessment-z-wave-devices-replay-attack-vulnerability-37242
Misra, A., Dubey, A.: Android Security: Attacks and Defenses. Auerbach Publications, Boca Raton (2013)
Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (Im)possibility of obfuscating programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 1–18. Springer, Heidelberg (2001). doi:10.1007/3-540-44647-8_1
Wroblewski, G.: General method of program code obfuscation. In: Proceedings of the International Conference on Software Engineering Research and Practice, SERP 2002, USA, pp. 153–159 (2002)
Ceccato, M., Di Penta, M., Nagra, J., Falcarin, P., Ricca, F., Torchiano, M., Tonella, P.: The effectiveness of source code obfuscation - an experimental assessment. In: Proceedings of the 17th IEEE International Conference on Program Comprehension, ICPC, pp. 178–187. IEEE Computer Society (2009)
Madou, M., Anckaert, B., De Bus, B., De Bosschere, K.: On the effectiveness of source code transformations for binary obfuscation. In: Proceedings of the of International Conference on Software Engineering Research and Practice, SERP 2006, pp. 527–533 (2006)
Canetti, R., Tauman Kalai, Y., Varia, M., Wichs, D.: On symmetric encryption and point obfuscation. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 52–71. Springer, Heidelberg (2010). doi:10.1007/978-3-642-11799-2_4
Bitansky, N., Canetti, R.: On strong simulation and composable point obfuscation. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 520–537. Springer, Heidelberg (2010). doi:10.1007/978-3-642-14623-7_28
Canetti, R., Dakdouk, R.R.: Obfuscating point functions with multibit output. In: Smart, N. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 489–508. Springer, Heidelberg (2008). doi:10.1007/978-3-540-78967-3_28
Patra, L., Rao, U.P.: Internet of Things - architecture, applications, security and other major challenges. In: Proceedings of the 3rd International Conference on Computing for Sustainable Global Development, INDIACom, New Delhi, pp. 1201–1206 (2016)
Billure, R., Tayur, V.M., Mahesh, V.: Internet of Things - a study on the security challenges. In: Billure IEEE International Advance Computing Conference, IACC, Banglore, pp. 247–252 (2015)
Shifa, A., Asghar, M.N., Fleury, M.: Multimedia security perspectives in IoT. In: Proceedings of the 6th International Conference on Innovative Computing Technology, INTECH, pp. 550–55 (2016)
Xi, W., Ling, L.: Research on IoT privacy security risks. In: International Conference on Industrial Informatics - Computing Technology, Intelligent Technology, Industrial Information Integration, ICIICII, Wuhan, pp. 259–262 (2016)
Ahamed, J., Rajan, A.V.: Internet of Things (IoT): application systems and security vulnerabilities. In: Proceedings of the 5th International Conference on Electronic Devices, Systems and Applications, ICEDSA, pp. 1–5 (2016)
Banu, R., Ahammed, G.F.A., Fathima, N.: A review on biologically inspired approaches to security for Internet of Things (IoT). In: International Conference on Electrical, Electronics and and Optimization Techniques, ICEEOT, Chennai, pp. 1062–1066 (2016)
Meisel, M., Vasileios, P., Lixia, Z.: A taxonomy of biologically inspired research in computer networking. Elsevier Comput. Netw. J. 54(6), 901–916 (2009)
Dressler, F., Akan, O.: A survey on bio-inspired networking. Elsevier Comput. Netw. J. 54(6), 881–900 (2010)
Mohamed, Y.A., Adbullah, A.B.: Biologically inspired Model for Securing Hybrid Mobile Ad hoc Networks. IEEE (2008)
Rathore, H., Jha, S.: Bio-Inspired Machine Learning Based Wireless Sensor Network Security. IEEE (2013)
Hodo, E., et al.: Threat analysis of IoT networks using artificial neural network intrusion detection system. In: International Symposium on Networks, Computers and Communications, ISNCC, pp. 1–6 (2016)
Michalska, A., Poniszewska-Marańda, A.: Security risks and their prevention capabilities in mobile application development. Inf. Syst. Manag. 4(2), 123–134 (2015). WULS Press
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Poniszewska-Maranda, A., Wieczorek, B. (2017). Aspects of Application Security for Internet of Things Systems. In: Younas, M., Awan, I., Holubova, I. (eds) Mobile Web and Intelligent Information Systems. MobiWIS 2017. Lecture Notes in Computer Science(), vol 10486. Springer, Cham. https://doi.org/10.1007/978-3-319-65515-4_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-65515-4_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-65514-7
Online ISBN: 978-3-319-65515-4
eBook Packages: Computer ScienceComputer Science (R0)