A Review on Privacy Requirements and Application Layer Security in Internet of Things (IoT)

被引:9
作者
Sudha, K. Swapna [1 ]
Jeyanthi, N. [1 ]
机构
[1] VIT, Sch Informat Technol & Engn, Vellore Campus, Vellore 632014, Tamil Nadu, India
关键词
Internet of Things (IoT); Security threats; Access control; Smart authentication; IoT applications; Cyber-attacks; AUTHENTICATION SCHEME; ACCESS-CONTROL; SMART; FRAMEWORK; PROTOCOL; ATTACKS; VULNERABILITIES; CHALLENGES; DEVICES; THREATS;
D O I
10.2478/cait-2021-0029
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) is the predominant emerging technology that targets on facilitating interconnection of internet-enabled resources. IoT applications concentrate on automating different tasks that facilitate physical objects to act autonomously without any human interventions. The emerging and current IoT applications are determined to be highly significant for improving the degree of efficiency, comfort and automation for its users. Any kind of security breach on the system will directly influences the life of the humans In this paper, a comprehensive review on Privacy requirements and application layer Security in Internet of Things (IoT) is presented for exploring the possible security issues in IoT that could be launched over the individual layers of IoT architecture. This review explores different challenges of classical security solutions that are related to authentication, key management and cryptographic solutions. It also presents the details of existing access control and device authentication schemes with their pros and cons.
引用
收藏
页码:50 / 72
页数:23
相关论文
共 80 条
[11]   Ontology-Based Security Context Reasoning for Power IoT-Cloud Security Service [J].
Choi, Chang ;
Choi, Junho .
IEEE ACCESS, 2019, 7 :110510-110517
[12]   Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment [J].
Das, Ashok Kumar ;
Wazid, Mohammad ;
Yannam, Animi Reddy ;
Rodrigues, Joel J. P. C. ;
Park, Youngho .
IEEE ACCESS, 2019, 7 :55382-55397
[13]   IoTsafe, Decoupling Security From Applications for a Safer IoT [J].
de Hoz Diego, Jorge David ;
Saldana, Jose ;
Fernandez-Navajas, Julian ;
Ruiz-Mas, Jose .
IEEE ACCESS, 2019, 7 :29942-29962
[14]   The Redundant Energy Consumption Laxity Based Algorithm to Perform Computation Processes for IoT Services [J].
Enokido, Tomoya ;
Takizawa, Makoto .
INTERNET OF THINGS, 2020, 9
[15]   Analysis of internet of things malware using image texture features and machine learning techniques [J].
Evanson, Mwangi Karanja ;
Shedden, Masupe ;
Jeffrey, Mandu Gasennelwe .
INTERNET OF THINGS, 2020, 9
[16]   Secure remote anonymous user authentication scheme for smart home environment [J].
Fakroon, Moneer ;
Alshahrani, Mohammed ;
Gebali, Fayez ;
Traore, Issa .
INTERNET OF THINGS, 2020, 9
[17]   A power-efficient audio acquisition system for smart city applications [J].
Fallis, Evan ;
Spachos, Petros ;
Gregori, Stefano .
INTERNET OF THINGS, 2020, 9
[18]   A Survey on Emerging SDN and NFV Security Mechanisms for IoT Systems [J].
Farris, Ivan ;
Taleb, Tarik ;
Khettab, Yacine ;
Song, Jaeseung .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (01) :812-837
[19]   Evaluating Critical Security Issues of the IoT World: Present and Future Challenges [J].
Frustaci, Mario ;
Pace, Pasquale ;
Aloi, Gianluca ;
Fortino, Giancarlo .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04) :2483-2495
[20]  
Gaikwad PP, 2015, 2015 1ST INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), P262, DOI 10.1109/NGCT.2015.7375123