Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1007/978-3-319-14977-6_3guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Privacy and Security Challenges in Internet of Things

Published: 05 February 2015 Publication History

Abstract

Internet of Things IoT envisions as a global network, connecting any objects around us, ranging from home appliances, wearable things to military applications. With IoT infrastructure, physical objects such as wearable objects, television, refrigerator, smart phones, supply-chain items and any objects across the globe would get connected using the Internet. Sensing, radio waves, mobile technology, embedded systems and Internet technology are promising actors which play significant roles in IoT infrastructure. Security and privacy issues in IoT scenarios would be much more challenging than what is been used in the conventional wireless scenarios. In particular, the constrained environments require lightweight primitives, secure design and effective integration into other environments in order to see IoT in its desired shape. In this paper, we discuss security and privacy challenges in IoT scenarios and applications with special emphasis on resource-constrained environments' security objectives and privacy requirement. We provide different perspectives of IoT, discuss about important driving forces of IoT, and propose a generic construction of secure protocol suitable for constrained environments with respect to IoT scenarios and applications.

References

[1]
Sarma, S., Brock, D.L., Ashton, K.: The Networked Physical World. MIT Auto-ID Center 2000
[2]
European Commission: Internet of Things - An action plan for Europe, http://europa.eu/legislation_summaries/information_society/internet/si0009_en.htm accessed January 2014
[3]
Yan, L., Zhang, Y., Yang, L.T., Ning, H.: The Internet Of Things. Auerbach Publications, Taylor and Francis Group, New York 2008
[4]
Das, M.L.: Strong Security and Privacy of RFID System for Internet of Things Infrastructure. In: Gierlichs, B., Guilley, S., Mukhopadhyay, D. eds. SPACE 2013. LNCS, vol. 8204, pp. 56---69. Springer, Heidelberg 2013
[5]
Callaway Jr., E.H.: Wireless Sensor Networks. Architectures and Protocols. Auerbach Publications 2003
[6]
Shelby, Z., Hartke, K., Bormann, C.: The Constrained Application Protocol CoAP. RFC 7252 June 2014, https://tools.ietf.org/html/rfc7252 accessed July 2014
[7]
Kushalnagar, N., Montenegro, G., Schumacher, C.: IPv6 over Low-Power Wireless Personal Area Networks 6LoWPANs. RFC 4919 August 2007, http://www.ietf.org/rfc/rfc4919.txt accessed December 2013
[8]
Roman, R., Najera, P., Lopez, J.: Securing the Internet of Things. IEEE Computer 449, 51---58 2011
[9]
ISO/IEC 14443-2:2001. Identification cards --- Contactless integrated circuits cards --- Proximity cards --- Part 2: Radio frequency power and signal interface
[10]
Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer 2004
[11]
ZigBee Specification, http://www.zigbee.org/Specifications.aspx accessed December 2013
[12]
Rescorla, E., Modadugu, N.: Datagram Transport Layer Security. RFC 4347 April 2006, https://tools.ietf.org/html/rfc4347 accessed December 2013
[13]
Dierks, T., Rescorla, E.: The Transport Layer Security TLS Protocol. RFC 5246 August 2008, http://www.rfc-base.org/txt/rfc-5246.txt accessed December 2013
[14]
Songhela, R., Das, M.L.: Yet Another Strong Privacy-Preserving RFID Mutual Authentication Protocol. In: Chakraborty, R.S., Matyas, V., Schaumont, P. eds. SPACE 2014. LNCS, vol. 8804, pp. 171---182. Springer, Heidelberg 2014

Cited By

View all

Index Terms

  1. Privacy and Security Challenges in Internet of Things

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    ICDCIT 2015: Proceedings of the 11th International Conference on Distributed Computing and Internet Technology - Volume 8956
    February 2015
    460 pages
    ISBN:9783319149769
    • Editors:
    • Raja Natarajan,
    • Gautam Barua,
    • Manas Patra

    Publisher

    Springer-Verlag

    Berlin, Heidelberg

    Publication History

    Published: 05 February 2015

    Author Tags

    1. Internet of Things
    2. Mobile communications
    3. Privacy
    4. RFID system
    5. Security
    6. Sensor networks

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 18 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    View options

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media