A comprehensive analysis of IoT security towards providing a cost-effective solution: a layered approach

被引:3
作者
Gopinath V. [1 ]
Rao K.V. [2 ]
Rao S.K. [3 ]
机构
[1] Department of Information Technology and Computer Applications, Andhra University College of Engineering, Andhra University, Andhra Pradesh, Visakhapatnam
[2] Department of Computer Science and Systems Engineering, Andhra University College of Engineering, Andhra University, Andhra Pradesh, Visakhapatnam
[3] Department of Information Technology, Sir C R Reddy College of Engineering, Andhra Pradesh, Eluru
关键词
Internet of Things; Privacy; Security; Security attacks; Security goals; Sensing layer;
D O I
10.1007/s41870-023-01405-5
中图分类号
学科分类号
摘要
Abstract: The Internet of Things (IoT) greatly influences people’s lives. Traditional privacy and security mechanisms may not suit for Internet of Things due to its resource constraint environments. So there is a need for privacy and security mechanisms, especially for IoT. A good number of security mechanisms are available in the network and application layers. The study reveals that there should be much more scope for providing security and privacy in the sensing layer itself. The paper focuses on IoT security goals and the security framework at the sensing layer. The sensing layer privacy and security are implemented through Blockchain Technology. The security is transmitted to the top layers, such as the network and application layers, by safeguarding the sensing layer. The cost of the highest tiers of security is automatically reduced. Then we analysed the proposed framework concerning security attacks and security goals. Finally, we analysed the cost-effectiveness of the system. Also, with the proposed work, 57.41% of IoT security goals impacts are reduced. At the physical layer, 71.43%; at the network layer, 70.59% and at the application layer, 38.46% of security goal impacts are prevented. Also, we formulated the thrust vector for the proposed framework. The findings indicate that the suggested approach increases trust by 61.36% while reducing costs by 60.16%. Graphical abstract: [Figure not available: see fulltext.]. © 2023, The Author(s), under exclusive licence to Bharati Vidyapeeth's Institute of Computer Applications and Management.
引用
收藏
页码:3813 / 3826
页数:13
相关论文
共 56 条
  • [1] Khattak H.A., Shah M.A., Khan S., Ali I., Imran M., Perception layer security in Internet of Things, Future Gener Comput Syst, (2019)
  • [2] Abi Sen A.A., Eassa F.A., Jambi K., Yamin M., Preserving privacy in Internet of Things: a survey, Int J Inf Technol, 10, pp. 89-200, (2018)
  • [3] Srikanth G.U., Geetha R., Prabhu S., An efficient Key Agreement and Authentication Scheme (KAAS) with enhanced security control for IIoT systems, Int J Inf Technol, (2023)
  • [4] Prabha P., Chatterjee K., Design and implementation of hybrid consensus mechanism for IoT based healthcare system security, Int J Inf Technol, 14, pp. 1381-1396, (2022)
  • [5] Burhan M., Rehman R.A., Khan B., Kim B.S., IoT elements, layered architectures and security issues: a comprehensive survey, Sensors (Switzerland), (2018)
  • [6] Patil R.V., Mahalle P.N., Shinde G.R., Trust score estimation for device to device communication in Internet of Thing using fuzzy approach, Int J Inf Technol, 14, pp. 1355-1365, (2022)
  • [7] Mahmoud R., Yousuf T., Aloul F., Zualkernan I., Internet of Things (IoT) security: Current status, challenges and prospective measures, 2015 10Th International Conference for Internet Technology and Secured Transactions, ICITST, 2015, pp. 336-341, (2016)
  • [8] Mosenia A., Jha N.K., A comprehensive study of security of Internet-of-Things, IEEE Trans Emerg Top Comput, 5, 4, pp. 586-602, (2017)
  • [9] Cherdantseva Y., Hilton J., A reference model of information assurance and security, Availability, Reliability and Security (ARES)., pp. 1-11, (2013)
  • [10] Kahate A., Cryptography and Network Security, 3Rd Edition (Issue January 2017), (2003)