Research on Security Issues of the Internet of Things

2014 ◽  
Vol 989-994 ◽  
pp. 4261-4264 ◽  
Author(s):  
Xiao Feng Wang

According to the current mainstream architecture of the Internet of Things, Makes research on security threat of the Internet of things from the perception layer, network layer and application layer, Gives the corresponding security policies and measures. It provides the theoretical reference for security of the Internet of things and privacy protection.

2011 ◽  
Vol 320 ◽  
pp. 291-296 ◽  
Author(s):  
Hong Feng Sun ◽  
Ying Li ◽  
Yan Chun Yang ◽  
Liang Feng ◽  
Hong Zhang

This paper analyses the traditional three-layer architecture of the Internet of things, proposes the SA/NIA five-layer architecture from the perspective of security based on two lower layers (Sensing layer, Access layer) and three higher layers (Network layer, Intermediary layer, Application layer), investigates security threats of all layers on the basis of SA/NIA and puts forward corresponding security schemes, so as to construct a safe and reliable system of the Internet of things.


2013 ◽  
Vol 765-767 ◽  
pp. 1007-1010
Author(s):  
Yun Chang Sang ◽  
Xin Gao

With the development of technology and applications of the Internet of Things, Things technology and industry being the attention from the government to enterprises and research institutions at different levels. The guarantee of Things safety is an important prerequisite to promote the healthy development of the Internet of Things. Articles oriented networking current mainstream architecture research from the three levels of perception layer, transport layer and application layer, the security threat of the Internet of Things, and appropriate security measures, provided for the establishment of the security architecture of the Internet of Things theoretical reference.


Author(s):  
Issmat Shah Masoodi ◽  
Bisma Javid

There are various emerging areas in which profoundly constrained interconnected devices connect to accomplish specific tasks. Nowadays, internet of things (IoT) enables many low-resource and constrained devices to communicate, do computations, and make smarter decisions within a short period. However, there are many challenges and issues in such devices like power consumption, limited battery, memory space, performance, cost, and security. This chapter presents the security issues in such a constrained environment, where the traditional cryptographic algorithms cannot be used and, thus, discusses various lightweight cryptographic algorithms in detail and present a comparison between these algorithms. Further, the chapter also discusses the power awakening scheme and reference architecture in IoT for constrained device environment with a focus on research challenges, issues, and their solutions.


Author(s):  
Jarogniew Rykowski ◽  
Wojciech Cellary

In this Chapter a new way of payments for Internet of Things services is proposed, based on a stream of anonymous pico-payments realized by means of pico-coins. System architecture and information flow are presented, showing fully automated way of contextual payments which protect customers' privacy. With the proposed stream of pico-payments, two basic problems of efficient and widely acceptable payment method for the Internet of Things are solved: privacy protection, and toleration of frequent unexpected disconnections.


Electronics ◽  
2019 ◽  
Vol 8 (9) ◽  
pp. 978 ◽  
Author(s):  
Yunfa Li ◽  
Yifei Tu ◽  
Jiawa Lu

With the increasing demand for intelligent services of the Internet of Things (IoT), its security issues have attracted widespread attention recently. Since most of the existing identity authentication policies are based on a single authentication mode, they are highly likely to cause problems such as illegal operation and stealing of sensor information. In order to meet the needs of increasing IoT users for the security management of intelligent services, a multi-point collaborative authentication method based on user image intelligent collection for the security problems faced by IoT in identity authentication is proposed in the paper. This method firstly collects the identity of the legal user through the intelligent collection technology and then realizes the identity authentication of the unidentified user through the collaborative authentication between the local domain management machine, the back-end image management machine, and the cloud server. Compared with the traditional single identity authentication method, our method uses three-party collaborative authentication to avoid the problem of sensor information stealing easily caused by a single authentication method, which makes the user’s identity authentication more secure and effective. The security analysis shows that the method is able to resist multiple attacks and prevent the sensor information from being illegally operated and stolen, protecting the security of the sensor information.


2011 ◽  
Vol 403-408 ◽  
pp. 2457-2460 ◽  
Author(s):  
Run Chen ◽  
Cai Ming Liu ◽  
Lu Xin Xiao

Grasping security situation of the Internet of Things (IoT) is useful to work out a scientific and reasonable strategy to defend the IoT security. In the interest of resolving the problems of the security situation sense technology for IoT, a security situation sense model based on artificial immune system for IoT is proposed in this paper. Security threat sense sub-model, formulation mechanism for security threat intensity and security situation assessment sub-model are established. The security threats in the IoT environment are surveyed effectively. Quantitative and accurate assessment for the Real-Time security situation is realized. Theoretical analysis shows that the proposed model is significative of theory and practice.


Sign in / Sign up

Export Citation Format

Share Document