Internet of Things: Architecture, Existing Protocol and Security Challenges
Citation
MLA Style: Ansari Kashafurrehman, Raj Kumar"Internet of Things: Architecture, Existing Protocol and Security Challenges" International Journal of Engineering Trends and Technology 61.1 (2018): 36-39.
APA Style:Ansari Kashafurrehman, Raj Kumar, (2018). Internet of Things: Architecture, Existing Protocol and Security ChallengesInternational Journal of Engineering Trends and Technology, 61(1), 36-39.
Abstract
The Internet of Things (IoT) is part of every of human life, that deals from smart phones and environmental sensors to smart devices used in the industry. IoT is a large distributed network in which billions of devices are interconnected and capable of preprocessing raw data and taking decisions on their own .It is considered to be the largest wave of resolution as it does not require human to machine interaction. However, with rapid growth of IoT, challenges in terms of security have evolved as well. Since IoT consist of three layers perception layer, network layer and application layer. This paper presents an effort to describe the IoT protocol stack and some of the most commonly used protocols and an analysis for various security problems at each layer including the cross-layer heterogeneous integration security issues.
Reference
[1] "Internet of Things A to Z: Technologies and Applications". Wiley.com. 2018-06-13. Retrieved 2018-06-05.
[2] Brown, Eric (13 September 2016). "Who Needs the Internet of Things?". Linux.com. Retrieved 23 October 2016.
[3] Brown, Eric (20 September 2016). "21 Open Source Projects for IoT". Linux.com. Retrieved 23 October 2016.
[4] "Internet of Things Global Standards Initiative". ITU.Retrieved 26 June 2015.
[5] "Internet of Things: Science Fiction or Business Fact?" (PDF). Harvard Business Review. November 2014. Retrieved 23 October 2016.
[6] Hendricks, Drew. "The Trouble with the Internet of Things". London Datastore.Greater London Authority.Retrieved 10 August 2015.
[7] Vermesan, Ovidiu; Friess, Peter (2013). Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems (PDF). Aalborg, Denmark: River Publishers. ISBN 978-87-92982-96-4.
[8] Santucci, Gérald. "The Internet of Things: Between the Revolution of the Internet and the Metamorphosis of Objects" (PDF). European Commission Community Research and Development Information Service.Retrieved 23 October 2016.
[9] Mattern, Friedemann; Floerkemeier, Christian. "From the Internet of Computers to the Internet of Things" (PDF). ETH Zurich.Retrieved 23 October 2016.
[10] Lindner, Tim (13 July 2015). "The Supply Chain: Changing at the Speed of Technology". Connected World.Retrieved 18 September 2015.
[11] W. Mingjun, Y. Zhen, Z. Wei, D. Xishang, Y. Xiaofei, S. Chenggang, et al., "A research on experimental system for Internet of Things major and application project," in System Science, Engineering Design and Manufacturing Informatization (ICSEM), 2012 3rd International Conference on, 2012, pp. 261-263.
[12] K. Rose, S. Eldridge, and L. Chapin, "The Internet of Things (IoT): An Overview– Understanding the Issues and Challenges of a More Connected World," Internet Society, 2015.
[13] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, "Internet of Things (IoT): A vision, architectural elements, and future directions," Future generation computer systems, vol. 29, pp. 1645-1660, 2013.
[14] M. Farooq, M. Waseem, A. Khairi, and S. Mazhar, "A critical analysis on the security concerns of internet of things (IoT)," International Journal of Computer Applications, vol. 111, 2015.
[15] T. V. N. Rao, S. K. Saheb, and A. J. R. Reddy, "Design of Architecture for Efficient Integration of Internet of Things and Cloud Computing," International Journal, vol. 8, 2017.
[16] D. Bandyopadhyay and J. Sen, "Internet of things: Applications and challenges in technology and standardization," Wireless Personal Communications, vol. 58, pp. 49- 69, 2011.
[17] Maria Rita Palattella et al. , ”Standardized Protocol Stack for the Internetof (Important) Things”, IEEE COMMUNICATIONS SURVEYSTUTORIALS, 2012.
Keywords
IoT, protocols stack, security challenges