Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(178.27KB)
This is an Open Access publication published under CSC-OpenAccess Policy.
Publications from CSC-OpenAccess Library are being accessed from over 74 countries worldwide.
A Comprehensive Review for Security Analysis of IoT Platforms
Chandrashekhar Uppin, Sudhir Anakal
Pages - 131 - 138     |    Revised - 31-08-2020     |    Published - 01-10-2020
Volume - 14   Issue - 4    |    Publication Date - October 2020  Table of Contents
MORE INFORMATION
KEYWORDS
Internet of Things, Security Requirements, IoT Platforms, Information Security, IoT Security.
ABSTRACT
Due to the rapid growth in the field of science and technology, IoT (Internet of Things) has become emerging technique for connecting heterogeneous technologies related to our daily needs that can affect our lives tremendously. It allows the devices to be connected to each other and controlled or monitored through handheld devices. The IoT network is a heterogeneous network that links several small hardware restriction devices, and where conventional security architectures and techniques cannot be used. So, providing protection to the IoT network involves a diverse range of specialized techniques and architectures. This paper focuses on the requirements of defense, current state of the art and future directions in the field of IoT.
1 H. Kopetz," Internet of things," in Real-Time Systems, ed: Springer,2011,pp.307-323.
2 P. Porambage, A. Braeken, C. Schmitt, A. Gurtov, M. Ylianttila, B. Stiller, "Group key establishment for enabling secure multicast communication in wireless sensor network deployed for IoT Applications", IEEE Access, vol. 3, pp. 1503-1511, August 2015
3 J. Zhou, Z. Cao, X. Dong, and A. V. Vasilakos, "Security and privacy for cloud-based IoT: challenges," IEEE Communications Magazine, vol. 55, no. 1, pp. 26-33, 2017
4 N. Aleisa and K. Renaud, "Privacy of the internet of things: a systematic literature review," in Proceedings of 50th Hawaii International Conference on System Sciences, Waikoloa, HI, USA, 2017
5 J. Veijalainen, D. Kozlov, and Y. Ali, "Security and privacy threats in IoT architectures," in Proceedings of 7th International Conference on Body Area Networks, Oslo, Norway, September 2012.
6 International Data Corporation (IDC), Explosive Internet of Things Spending to Reach $1.7 Trillion in 2020, According to IDC, 02 June 2015, [Online]. Available: http://www.idc.com/getdoc. jsp?containerId=prUS25658015. [Accessed 22 August 2016].
7 S.-R. Oh, Y.-G. Kim, "Security analysis of MQTT and CoAP protocols in the IoT environment", Korea Information Processing Society (KIPS) South Korea, pp. 297-299, April 2016.
8 Al-Fuqaha, A.; Guizani, M.; Mohammadi, M.; Aledhari, M.; Ayyash, M. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications. IEEE Commun. Surv. Tutor. 2015, 17, 2347-2376. [CrossRef]
9 Xu, L.D.; He, W.; Li, S. Internet of Things in Industries: A Survey. IEEE Trans. Ind. Inform. 2014, 10, 2233-2243.
10 Ganguly, P. Selecting the right IoT cloud platform. In Proceedings of the 2016 International Conference on Internet of Things and Applications (IOTA), Pune, India, 22-24 January 2016; pp. 316-320.
11 Guth, J.; Breitenb�cher, U.; Falkenthal, M.; Leymann, F.; Reinfurt, L. Comparison of IoT platform architectures: A field study based on a reference architecture. In Proceedings of the 2016 Cloudification of the Internet of Things (CIoT), Paris, France, 23-25 November 2016; pp. 1-6.
12 Derhamy, H.; Eliasson, J.; Delsing, J.; Priller, P. A survey of commercial frameworks for the Internet of Things. In Proceedings of the 2015 IEEE 20th Conference on Emerging Technologies Factory Automation (ETFA), Luxembourg, 8-11 September 2015; pp. 1-8.
13 Choi BC, Lee SH, Na JC, Lee JH (2016) Secure firmware validation and update for consumer devices in home networking. IEEE Trans Consum Electron 62(1):39-44
14 Lee S, Kim J, Shon T (2016) User privacy-enhanced security architecture for home area network of smartgrid. Multimed Tools Appl 75(2016):12749-12764
15 Tomanek O, Kencl L (2016) Security and privacy of using AllJoyn IoT framework at home and beyond. 2016 2nd international conference on intelligent green building and smart grid (IGBSG), pp 1-6
16 Abdallah AR, Shen XS (2014) Lightweight lattice-based homomorphic privacy-preserving aggregation scheme for home area networks. 2014 sixth international conference on wireless communications and signal processing (WCSP), pp 1-6
17 Mantoro T, Ayu MA, binti Mahmod SM (2014) Securing the authentication and message integrity for smart home using smart phone. 2014 international conference on multimedia computing and systems (ICMCS), pp 1-5.
18 Lee C, Zappaterra L, Choi K, Choi HA (2014) Securing smart home: technologies, security challenges, and security requirements. Workshop on security and privacy in machine-to-machine communications (M2MSec14), pp 67-72
19 Komninos N, Philippou E, Pitsillides A (2014) Survey in smart grid and smart home security: issues, challenges and countermeasures. IEEE Commun Surv Tutor 16(4):1933-1954
20 Schiefer M (2015) Smart home definition and security threats. 2015 ninth international conference on IT security incident management & IT forensics, pp 114-118.
21 Jacobsson A, Boldt M, Carlsson B (2016) A risk analysis of a smart home automation system. Future Gener Comput Syst 56(2016):719-733
22 Jose AC, Malekian R (2015) Smart home automation security: a literature review. Smart Comput Rev 5(4):269-285.
23 U. Saxena, J. S. Sodhi and Y. Singh, "Analysis of security attacks in a smart home networks," 2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence, Noida, pp. 431- 436, 2017.
24 Hunke, N.; Rmann, M.; Schmieg, F.; Bhatia, A.; Kalra, N. Winning in IoT: Its All about the Business Processes. Available online:https://www.bcg.com/en-co/publications/2017/hardware-software-energyenvironment-winning-in-iot-all-about-winning-processes.aspx (accessed on 25 October 2018).
Dr. Chandrashekhar Uppin
Department of Computer Science, Faculty of Computing and Applied Sciences, Baze University, Jabi Abuja - Nigeria
cvuppin@gmail.com
Mr. Sudhir Anakal
Department of Studies in Computer Applications, Visvesvaraya Technological University, Postgraduate Centre, Kalaburagi - India