An Insight into Current IoT Security Methods


  • K.K. Yuen Tunku Abdul Rahman University College.
  • W.H. Shim Tunku Abdul Rahman University College.
  • T.T. Ting Tunku Abdul Rahman University College.
  • C.K. Teoh Tunku Abdul Rahman University College.


Framework, Internet-of-Things, Protocol, Security,


This paper examines the security methods in the Internet-of-Things. The security methods are carefully studied and categorized into six layers according to the Internet-ofThings framework namely Event Producer and Consumer, Event Queuing System, Transformation and Analysis, Storage, Presentation and Action, and Users and Systems. It can be observed that most security methods emphasizes on Event Producer and Consumer layer whereas the least focused layer is Users and Systems layer. This study aims to present a comprehensive overview to researchers working in the domain of the Internet-of-Things security.


Barreno, Marco, Blaine Nelson, Russell Sears, Anthony D. Joseph, and J. Doug Tygar. (2006). Can machine learning be secure? In Proceedings of the 2006 ACM Symposium on Information, computer and communications security. 16-25

Zhang, Weizhe, and Baosheng Qu. (2013). Security Architecture of the Internet-of-Things Oriented to Perceptual Layer. International Journal on Computer, Consumer and Control (IJ3C). Vol.2 No. 2. 37-45

Chen, Deyan and Zhao, Hong. (2012). Data security and privacy protection issues in cloud computing. In Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference. Vol 1. 647-651. IEEE.

Cheswick, William.R., Steven M.Bellovin and Aviel D.Rubin. (2003). Firewalls and Internet security: repelling the wily hacker. AddisonWesley Longman Publishing Co., Inc.

Christin, Delphine, Andreas Reinhardt, Parag S.Mogre, and Ralf Steinmetz. (2009). Wireless sensor networks and the Internet-ofThings: selected challenges. Proceedings of the 8th GI/ITG KuVS Fachgespräch Drahtlose Sensornetze. 31-34.

Clausen, Thomas. and Philippe Jacquet. (2003). Optimized link state routing protocol (OLSR). No. RFC 3626.

Want, Roy. (2006). An introduction to RFID technology. IEEE Pervasive Computing. Vol. 5 No. 1. 25-33

Delosieres, Laurent. and Simin Nadjm-Tehrani. (2012). Batman storeand-forward: the best of the two worlds. In Pervasive Computing and Communications Workshops (PERCOM Workshops). 2012 IEEE International Conference on 721-727. IEEE.

Suo, Hui, Jiafu Wan, Caifeng Zou, and Jianqi Liu. (2012). Security in the Internet-of-Things: a review. In Computer Science and Electronics Engineering (ICCSEE). 2012 International Conference on IEEE. Vol. 3. 648-651

Shakshuki, Elhadi M., Nan Kang, and Tarek R. Sheltami. (2013). EAACK—a secure intrusion-detection system for MANETs. IEEE Transactions on Industrial Electronics. Vol. 60. No. 2. 1089-1098.

Seither, Daniel, André König, and Matthias Hollick. (2011). Routing performance of Wireless Mesh Networks: A practical evaluation of BATMAN advanced. In Local Computer Networks (LCN). 36th Conference IEEE. 897-904.

Scheidell, Michael. (2009) Secnap Networks Security, LLC. Intrusion detection system. U.S. Patent 7,603,711.

Fielding, Roy, Jim Gettys, Jeffrey Mogul, Henrik Frystyk, Larry Masinter, Paul Leach and Tim Berners-Lee. (1999). Hypertext transfer protocol--HTTP/1.1 .No. RFC 2616.

Ge, Ying, Thomas Kunz, and Louise Lamont. (2003). Quality of service routing in ad-hoc networks using OLSR. In System Sciences. Proceedings of the 36th Annual Hawaii International Conference on 9. IEEE.

Glenn Vassallo. (2015). Code Project. [ONLINE] Available at: [Accessed 17 November 2016].

Ha, Minkeun, Kim, Seong Hoon Kim, Hyungseok Kim, Kiwoong Kwon, Nam Giang, and Daeyoung Kim. (2012). Snail gateway: Dualmode wireless access points for wifi and ip-based wireless sensor networks in the Internet-of-Things. In 2012 IEEE Consumer Communications and Networking Conference. CCNC. 169-173. IEEE.

Horng, Shi-Jinn., Ming-Yang Su, Yuan-Hsin Chen. Tzong-Wann Kao. Rong-Jian Chen.Jui-Lin Lai . and Citra Dwi Perkasa. (2011). A novel intrusion detection system based on hierarchical clustering and support vector machines. Expert systems with Applications. Vol. 38. No. 1. 306-313

JAMES, BD. (2010). Security and privacy challenges in cloud computing environments.

Johnson, David, Ntsibane Ntlatlapa, and Corinna Aichele. (2008). Simple pragmatic approach to mesh routing using BATMAN.

Wu, Kui, and Janelle Harms. (2001). QoS Support in Mobile Ad-Hoc Networks”. Crossing Boundaries – an Inter Disciplinary Journal. Vol. 1. No. 1. 92-107

Rowland, Craig H. (2002). Psionic Software, Inc. Intrusion detection system. U.S. Patent 6,405,318

Lane, Terran D. (2000). Machine learning techniques for the computer security domain of anomaly detection.

Liao, Hung-Jen, Chun-Hung Richard Lin, Ying-Chih Lin, and KuangYuan Tung. (2013). Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications. Vol. 36. No. 2. 16-24

Linehan, Paul, Shane O'neill, John Donaghy, Armin Lackermeier, and James McKee. (2003). Event queue system. U.S. Patent Application No.10/389,207.

Maindonald, J.H. (1992). Statistical design, analysis, and presentation issues. New Zealand journal of agricultural research. Vol. 35. No. 2. 121-141

Manjeshwar, Arati, and Dharma P. Agrawal. (2001). TEEN: ARouting Protocol for Enhanced Efficiency in Wireless Sensor Networks. In IPDPS. Vol. 1. 189

Rowett, Kevin, and Somsubhra Sikdar. (2005). Intrusion detection system. U.S. Patent Application 11/125,956.

Munger, Edmund Colby, Douglas Charles Schmidt, Robert Dunham Short III, Victor Larson, and Michael Williamson. (2002). Science Applications International Corporation. Agile network protocol for secure communications with assured system availability. U.S. Patent 6,502,135.

Ning, Huansheng, and Hong Liu. (2012). Cyber-physical-social based security architecture for future Internet-of-Things. Advances in Internet-of-Things. Vol. 2 No. 1. 1

Rao, KV Seshagiri, Pavel V. Nikitin, and Sander F. Lam. (2005). Antenna design for UHF RFID tags: A review and a practical application. IEEE Transactions on antennas and propagation. Vol. 53. No.12. 3870-3876.

Ramgovind, Sumant, Mariki M. Eloff, and Elme Smith. (2010). The management of security in cloud computing. In 2010 Information Security for South Africa. IEEE. 1-7.




How to Cite

Yuen, K., Shim, W., Ting, T., & Teoh, C. (2018). An Insight into Current IoT Security Methods. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 10(1-6), 121–125. Retrieved from