Call for Paper - January 2022 Edition
IJCA solicits original research papers for the January 2022 Edition. Last date of manuscript submission is December 20, 2021. Read More

A Literature Survey on IoT Security Challenges

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Shubhalika Dihulia, Tanveer Farooqui

Shubhalika Dihulia and Tanveer Farooqui. A Literature Survey on IoT Security Challenges. International Journal of Computer Applications 169(4):10-14, July 2017. BibTeX

	author = {Shubhalika Dihulia and Tanveer Farooqui},
	title = {A Literature Survey on IoT Security Challenges},
	journal = {International Journal of Computer Applications},
	issue_date = {July 2017},
	volume = {169},
	number = {4},
	month = {Jul},
	year = {2017},
	issn = {0975-8887},
	pages = {10-14},
	numpages = {5},
	url = {},
	doi = {10.5120/ijca2017914616},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


This survey paper discuss the security challenges in IoT network. IoT is hot research topic in between researchers. In the era of digital media IoT play an important role of information servers and data warehouses. IoT network are used in different cities of smart city network. That’s why the security of the IoT network is also a big task. There are many loop holes available in IoT based security network. In this survey paper discuss the security aspects in the IoT networks. Also discuss the different researches previous work and previous work in IoT security. This survey analyzes existing protocols and mechanisms to secure communications in the IoT, as well as open research issues. We analyze how existing approaches ensure fundamental security requirements and protect communications on the IoT, together with the open challenges and strategies for future research work in the area. This is, as far as our knowledge goes, the first survey with such goals.


  1. Bowman, Lianos, M. and Douglas, M. (2000) Dangerization and the End of Deviance: The Institutional Environment. British Journal of Criminology, 40, 261-278.
  2. Ferguson, T. (2002) Have Your Objects Call My Object. Harvard Business Review, June, 1-7.
  3. Nunberg, G. (2012) The Advent of the Internet: 12th April, Courses.
  4. Kosmatos, E.A., Tselikas, N.D. and Boucouvalas, A.C. (2011) Integrating RFIDs and Smart Objects into a Unified Internet of Things Architecture. Advances in Internet of Things: Scientific Research, 1, 5-12.
  5. Aggarwal, R. and Lal Das, M. (2012) RFID Security in the Context of “Internet of Things”. First International Conference on Security of Internet of Things, Kerala, 17-19 August 2012, 51-56.
  6. Biddlecombe, E. (2009) UN Predicts “Internet of Things”. Retrieved July 6.
  7. Butler, D. (2020) Computing: Everything, Everywhere. Nature, 440, 402-405.
  8. Dodson, S. (2008) The Net shapes up to Get Physical. Guardian.
  9. Gershenfeld, N., Krikorian, R. and Cohen, D. (2004) the Internet of Things. Scientific American, 291, 76-81.
  10. Lombreglia, R. (2010) the Internet of Things, Boston Globe. Retrieved October.
  11. Reinhardt, A. (2004) A Machine-to-Machine Internet of Things.
  12. Graham, M. and Haarstad, H. (2011) Transparency and Development: Ethical Consumption through Web 2.0 and the Internet of Things. Research Article, 7.
  13. Jayavardhana, G., Rajkumar, B., Marusic, S. and Palaniswami, M. (2013) Internet of Things: A Vision, Architectural Elements, and Future Directions. Future Generation.
  14. Gigli, M. and Koo, S. (2011) Internet of Things, Services and Applications Categorization. Advances in Internet of Things, 1, 27-31.
  15. (2005) ITU Internet Reports, International Telecommunication Union. The Internet of Things: 7th Edition.
  16. Want, R. (2006) An Introduction to RFID Technology. IEEE Pervasive Computing, 5, 25-33.
  17. Li, B.A. and Yu, J.J. (2011) Research and Application on the Smart Home Based on Component Technologies and Internet of Things. Procedia Engineering, 15, 2087-2092.
  18. Razzak, F. (2012) Spamming the Internet of Things: A Possibility and its probable Solution. Procedia Computer Science, 10, 658-665.
  19. Shao, W. and Li, L. (2009) Analysis of the Development Route of IoT in China. Perking: China Science and Technology Information, 24, 330-331.
  20. Sun, C. (2012) Application of RFID Technology for Logistics on Internet of Things.
  21. Moeinfar, D., Shamsi, H. and Nafar, F. (2012) Design and Implementation of a Low-Power Active RFID for Container Tracking @ 2.4 GHz Frequency: Scientific Research.
  22. Bicknell, IPv6 Internet Broken, Verizon Route Prefix Length Policy, 2009.
  23. Grieco A., Occhipinti, E. and Colombini, D. (1989) Work Postures and Musculo-Skeletal Disorder in VDT Operators. Bollettino de Oculistica, Suppl. 7, 99-111.
  24. Pahlavan, K., Krishnamurthy, P., Hatami, A., Ylianttila, M., Makela, J.P., Pichna, R. and Vallstron, J. (2007) Handoff in Hybrid Mobile Data Networks. Mobile and Wireless Communication Summit, 7, 43-47.
  25. Chen, X.-Y. and Jin, Z.-G. (2012) Research on Key Technology and Applications for the Internet of Things. Physics Procedia, 33,561-566.
  26. Arampatzis, T., et al. (2005) A Survey of Security Issues in Wireless Sensors Networks, in Intelligent Control. Proceeding of the IEEE International Symposium on, Mediterrean Conference on Control and Automation, 719-724.
  27. Chorost, M. (2008) The Networked Pill, MIT Technology Review, March.


End-to-end security, IEEE 802.15.4, Internet of things, RPL, Security, MAC layer, IP V6 and V4