Design challenges and security issues in the Internet of Things

被引:21
作者
Basu, Subho Shankar [1 ]
Tripathy, Somanath [1 ]
Chowdhury, Atanu Roy [2 ]
机构
[1] IIT Patna, Dept CSE, Patna, Bihar, India
[2] Altiux Innovat, Bengaluru, Karnataka, India
来源
2015 IEEE REGION 10 SYMPOSIUM (TENSYMP) | 2015年
关键词
Internet of Things (IoT); Security; Resource constrained devices; End-to-end (E2E) security;
D O I
10.1109/TENSYMP.2015.25
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The world is rapidly getting connected. Commonplace everyday things are providing and consuming software services exposed by other things and service providers. A mashup of such services extends the reach of the current Internet to potentially resource constrained "Things", constituting what is being referred to as the Internet of Things (IoT). IoT is finding applications in various fields like Smart Cities, Smart Grids, Smart Transportation, e-health and e-governance. The complexity of developing IoT solutions arise from the diversity right from device capability all the way to the business requirements. In this paper we focus primarily on the security issues related to design challenges in IoT applications and present an end-to-end security framework.
引用
收藏
页码:90 / 93
页数:4
相关论文
共 12 条
[1]  
[Anonymous], THESIS
[2]  
[Anonymous], 2014, TR0008
[3]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[4]  
Bagci Ibrahim Ethem, 2013, 2013 IEEE International Conference on Sensing, Communications and Networking (SECON), P523, DOI 10.1109/SAHCN.2013.6645024
[5]  
Hartke K., 2012, Datagram transport layer security in constrained environments
[6]  
Kothmayr T., 2013, AD HOC NETW, V11, P2710
[7]  
Mainetti L., 2011, SOFTCOM 2011 19 INT, P1
[8]  
Modadugu Nagendra, 2004, NDSS
[9]  
Raza S., 2011, 2011 INT C DISTR COM, P1, DOI 10.1109/DCOSS.2011.5982177
[10]   6LoWPAN Compressed DTLS for CoAP [J].
Raza, Shahid ;
Trabalza, Daniele ;
Voigt, Thiemo .
2012 IEEE 8TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS), 2012, :287-289