A Comprehensive Study of Security Issues and Research Challenges in Different Layers of Service‐Oriented IoT Architecture

2022 ◽  
pp. 1-43
Author(s):  
Ankur O. Bang ◽  
Udai Pratap Rao ◽  
Amit A. Bhusari
2008 ◽  
Vol 50 (2) ◽  
Author(s):  
Shahram Dustdar ◽  
Mike P. Papazoglou

SummaryIn this overview paper, we discuss the basic principles underlying service-oriented computing in general, and (Web) services in particular. We discuss the important differences between (Web) services and Web applications and other models in Internet computing. Finally, we discuss where we see the future research challenges in the area of service composition.


Author(s):  
Issmat Shah Masoodi ◽  
Bisma Javid

There are various emerging areas in which profoundly constrained interconnected devices connect to accomplish specific tasks. Nowadays, internet of things (IoT) enables many low-resource and constrained devices to communicate, do computations, and make smarter decisions within a short period. However, there are many challenges and issues in such devices like power consumption, limited battery, memory space, performance, cost, and security. This chapter presents the security issues in such a constrained environment, where the traditional cryptographic algorithms cannot be used and, thus, discusses various lightweight cryptographic algorithms in detail and present a comparison between these algorithms. Further, the chapter also discusses the power awakening scheme and reference architecture in IoT for constrained device environment with a focus on research challenges, issues, and their solutions.


2018 ◽  
Vol 7 (2.8) ◽  
pp. 35
Author(s):  
C Mahesh ◽  
F T.Josh ◽  
A Sanjeevi Gandhi

Microgrid is an integrated network of renewable and non renewable resources to supply the green power to a small range of community. An effective communication technology is necessary to be implemented among the power generations, storages and loads of microgrid in order to manage the load sharing, shedding and protection issues. This paper provides the study on architecture, characteristics, load managements, protection schemes, communication techniques and research challenges of microgrid.


2018 ◽  
Vol 7 (2.32) ◽  
pp. 298 ◽  
Author(s):  
M Bhargavi ◽  
Dr M.Nagabhushana Rao

The Internet of Things (IoT) is a revolutionary model, with rising wireless sensor network technology. In IoT network devices are connected and communicated with each other or with human. IoT is extremely available to security assaults. In recent years, the internet of things has a continuous support in research. In the upcoming scenario, IoT will play an important role and changes our day-to-day life, principles as well as industry models. In this paper we provide ensuring security of data exchange, IoT architecture and IoT Security architecture, applications, drawbacks of IoT. We study about various security issues, Problems, normal and Denial of service attacks in different layers, issues and research defy in IoT are also discussed.   


Author(s):  
Rizwan Ur Rahman ◽  
Divya Rishi Sahu ◽  
Deepak Singh Tomar

Web services and Service oriented architecture are innovative phase of distributed computing, build on top of the distributed computing models. Web services are being used mostly for the integration business components. One of the key concerns in web services and service oriented architecture is implementation of adequate security. Security issues in SOA are still probing and in spite of an increase in web service research and development, many security challenges remain unanswered. This chapter introduces the vulnerabilities, threats associated with web services and addresses WS-Security standards and countermeasures. Web service protocol is designed to provide connectivity. Not any of these standards of web services contain any inbuilt security aspect of their own. Web Services are exposed to attack from common Internet protocols and in addition to new categories of attacks targeting Web Services in particular. Consequently, the aim of this chapter is to provide review of security mechanism in web services.


Sign in / Sign up

Export Citation Format

Share Document