CFP last date
22 April 2024
Reseach Article

Internet of Things Security based on Devices Architecture

by Taha M. Alfaqih, Jalal Al-Muhtadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 133 - Number 15
Year of Publication: 2016
Authors: Taha M. Alfaqih, Jalal Al-Muhtadi
10.5120/ijca2016908191

Taha M. Alfaqih, Jalal Al-Muhtadi . Internet of Things Security based on Devices Architecture. International Journal of Computer Applications. 133, 15 ( January 2016), 19-23. DOI=10.5120/ijca2016908191

@article{ 10.5120/ijca2016908191,
author = { Taha M. Alfaqih, Jalal Al-Muhtadi },
title = { Internet of Things Security based on Devices Architecture },
journal = { International Journal of Computer Applications },
issue_date = { January 2016 },
volume = { 133 },
number = { 15 },
month = { January },
year = { 2016 },
issn = { 0975-8887 },
pages = { 19-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume133/number15/23863-2016908191/ },
doi = { 10.5120/ijca2016908191 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:31:20.465936+05:30
%A Taha M. Alfaqih
%A Jalal Al-Muhtadi
%T Internet of Things Security based on Devices Architecture
%J International Journal of Computer Applications
%@ 0975-8887
%V 133
%N 15
%P 19-23
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The Internet of Things, also called The Internet of Objects, refers to a wireless network between objects; usually the network will be wireless and self-configuring, such as household appliances. Secures IOT end-to-end, which means authenticating device communications, protecting code and applications, and securing devices from threats. Emergence accompanied the IoT technology, or when using of this technology and its deployment, an increase in security and privacy violation, so must take caution when used , and also paid to further research in this technology which that bothered a lot, including confidentiality, authenticity, and integrity. In this paper we will present the security and privacy when using the Internet of Things technology, depending on the architecture of the devices, and will be focusing on how security building in the devices, and protection requirements, by studying the architecture layer and IoT security infrastructure.

References
  1. A. Zanella, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi, "Internet of things for smart cities," Internet of Things Journal, IEEE, vol. 1, pp. 22-32, 2014.
  2. H. Suo, J. Wan, C. Zou, and J. Liu, "Security in the internet of things: a review," in Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on, 2012, pp. 648-651.
  3. R. H. Weber, "Internet of things: Privacy issues revisited," Computer Law & Security Review, vol. 31, pp. 618-627, 2015.
  4. A. Shipley, "Security in the internet of things, lessons from the past for the connected future," Security Solutions, Wind River, White Paper, 2013.
  5. L. Atzori, A. Iera, G. Morabito, and M. Nitti, "The social internet of things (siot)–when social networks meet the internet of things: Concept, architecture and network characterization," Computer Networks, vol. 56, pp. 3594-3608, 2012.
  6. L. Atzori, A. Iera, and G. Morabito, "The internet of things: A survey," Computer Networks, vol. 54, pp. 2787-2805, 2010.
  7. A. J. Jara, M. A. Zamora, and A. F. Skarmeta, "An internet of things---based personal device for diabetes therapy management in ambient assisted living (AAL)," Personal and Ubiquitous Computing, vol. 15, pp. 431-440, 2011.
  8. S. Babar, P. Mahalle, A. Stango, N. Prasad, and R. Prasad, "Proposed security model and threat taxonomy for the internet of things (IoT)," in Recent Trends in Network Security and Applications, ed: Springer, 2010, pp. 420-429.
  9. O. Vermesan, P. Friess, P. Guillemin, S. Gusmeroli, H. Sundmaeker, A. Bassi, I. S. Jubert, M. Mazura, M. Harrison, and M. Eisenhauer, "Internet of things strategic research roadmap," O. Vermesan, P. Friess, P. Guillemin, S. Gusmeroli, H. Sundmaeker, A. Bassi, et al., Internet of Things: Global Technological and Societal Trends, vol. 1, pp. 9-52, 2011.
  10. L. Tan and N. Wang, "Future internet: The internet of things," in Advanced Computer Theory and Engineering (ICACTE), 2010 3rd International Conference on, 2010, pp. V5-376-V5-380.
  11. D. Uckelmann, M. Harrison, and F. Michahelles, Architecting the internet of things: Springer Science & Business Media, 2011.
  12. L. Da Xu, W. He, and S. Li, "Internet of Things in industries: A survey," Industrial Informatics, IEEE Transactions on, vol. 10, pp. 2233-2243, 2014.
  13. X. Yang, Z. Li, Z. Geng, and H. Zhang, "A multi-layer security model for internet of things," in Internet of Things, ed: Springer, 2012, pp. 388-393.
  14. G. Gang, L. Zeyong, and J. Jun, "Internet of things security analysis," in Internet Technology and Applications (iTAP), 2011 International Conference on, 2011, pp. 1-4.
  15. S. Sharma, A. Sahu, A. Verma, and N. Shukla, "Wireless sensor network security," in Advances in Computer Science and Information Technology. Computer Science and Information Technology, ed: Springer, 2012, pp. 317-326.
  16. C. M. Medaglia and A. Serbanati, "An overview of privacy and security issues in the internet of things," in The Internet of Things, ed: Springer, 2010, pp. 389-395.
  17. S. Peng and H. Shen, "Security Technology Analysis of IOT," in Internet of Things, ed: Springer, 2012, pp. 401-408.
  18. I. Gudymenko and M. Hutter, "Security in the Internet of Things," Proceedings of Intensive Program on Information Communication Security (IPICS 2011), pp. 22-31, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Internet of Things RFID GPS Privacy authentication.