A Review on Privacy Requirements and Application Layer Security in Internet of Things (IoT)

被引:9
作者
Sudha, K. Swapna [1 ]
Jeyanthi, N. [1 ]
机构
[1] VIT, Sch Informat Technol & Engn, Vellore Campus, Vellore 632014, Tamil Nadu, India
关键词
Internet of Things (IoT); Security threats; Access control; Smart authentication; IoT applications; Cyber-attacks; AUTHENTICATION SCHEME; ACCESS-CONTROL; SMART; FRAMEWORK; PROTOCOL; ATTACKS; VULNERABILITIES; CHALLENGES; DEVICES; THREATS;
D O I
10.2478/cait-2021-0029
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) is the predominant emerging technology that targets on facilitating interconnection of internet-enabled resources. IoT applications concentrate on automating different tasks that facilitate physical objects to act autonomously without any human interventions. The emerging and current IoT applications are determined to be highly significant for improving the degree of efficiency, comfort and automation for its users. Any kind of security breach on the system will directly influences the life of the humans In this paper, a comprehensive review on Privacy requirements and application layer Security in Internet of Things (IoT) is presented for exploring the possible security issues in IoT that could be launched over the individual layers of IoT architecture. This review explores different challenges of classical security solutions that are related to authentication, key management and cryptographic solutions. It also presents the details of existing access control and device authentication schemes with their pros and cons.
引用
收藏
页码:50 / 72
页数:23
相关论文
共 80 条
[1]   Scalability analysis of multiple LoRa gateways using stochastic geometry [J].
Aftab, Noman ;
Zaidi, Syed Ali Raza ;
McLernon, Des .
INTERNET OF THINGS, 2020, 9
[2]   Internet of Things: A Comprehensive Study of Security Issues and Defense Mechanisms [J].
Ahanger, Tariq Ahamed ;
Aljumah, Abdullah .
IEEE ACCESS, 2019, 7 :11020-11028
[3]   Anonymous mutual IoT interdevice authentication and key agreement scheme based on the ZigBee technique [J].
Alshahrani, Mohammed ;
Traore, Issa ;
Woungang, Isaac .
INTERNET OF THINGS, 2019, 7
[4]   Exploiting Workflow Languages and Semantics for Validation of Security Policies in IoT Composite Services [J].
Amato, Flora ;
Casola, Valentina ;
Cozzolino, Giovanni ;
De Benedictis, Alessandra ;
Moscato, Francesco .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (05) :4655-4665
[5]  
Ashibani Y, 2017, IEEE IPCCC
[6]   Attitudes and Perceptions of IoT Security in Critical Societal Services [J].
Asplund, Mikael ;
Nadjm-Tehrani, Simin .
IEEE ACCESS, 2016, 4 :2130-2138
[7]   Smart City IoT Platform Respecting GDPR Privacy and Security Aspects [J].
Badii, Claudio ;
Bellini, Pierfrancesco ;
Difino, Angelo ;
Nesi, Paolo .
IEEE ACCESS, 2020, 8 (08) :23601-23623
[8]   Rogue Base Stations Detection for Advanced Metering Infrastructure Based on Signal Strength Clustering [J].
Bin, Qian ;
Ziwen, Cai ;
Yong, Xiao ;
Liang, Hong ;
Sheng, Su .
IEEE ACCESS, 2020, 8 :158798-158805
[9]   Secured Document Sharing Using Visual Cryptography in Cloud Data Storage [J].
Brindha, K. ;
Jeyanthi, N. .
CYBERNETICS AND INFORMATION TECHNOLOGIES, 2015, 15 (04) :111-123
[10]   Network Intrusion Detection for IoT Security Based on Learning Techniques [J].
Chaabouni, Nadia ;
Mosbah, Mohamed ;
Zemmari, Akka ;
Sauvignac, Cyrille ;
Faruki, Parvez .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (03) :2671-2701