An Insight into Current IoT Security Methods
Keywords:Framework, Internet-of-Things, Protocol, Security,
AbstractThis paper examines the security methods in the Internet-of-Things. The security methods are carefully studied and categorized into six layers according to the Internet-ofThings framework namely Event Producer and Consumer, Event Queuing System, Transformation and Analysis, Storage, Presentation and Action, and Users and Systems. It can be observed that most security methods emphasizes on Event Producer and Consumer layer whereas the least focused layer is Users and Systems layer. This study aims to present a comprehensive overview to researchers working in the domain of the Internet-of-Things security.
Barreno, Marco, Blaine Nelson, Russell Sears, Anthony D. Joseph, and J. Doug Tygar. (2006). Can machine learning be secure? In Proceedings of the 2006 ACM Symposium on Information, computer and communications security. 16-25
Zhang, Weizhe, and Baosheng Qu. (2013). Security Architecture of the Internet-of-Things Oriented to Perceptual Layer. International Journal on Computer, Consumer and Control (IJ3C). Vol.2 No. 2. 37-45
Chen, Deyan and Zhao, Hong. (2012). Data security and privacy protection issues in cloud computing. In Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference. Vol 1. 647-651. IEEE.
Cheswick, William.R., Steven M.Bellovin and Aviel D.Rubin. (2003). Firewalls and Internet security: repelling the wily hacker. AddisonWesley Longman Publishing Co., Inc.
Christin, Delphine, Andreas Reinhardt, Parag S.Mogre, and Ralf Steinmetz. (2009). Wireless sensor networks and the Internet-ofThings: selected challenges. Proceedings of the 8th GI/ITG KuVS Fachgespräch Drahtlose Sensornetze. 31-34.
Clausen, Thomas. and Philippe Jacquet. (2003). Optimized link state routing protocol (OLSR). No. RFC 3626.
Want, Roy. (2006). An introduction to RFID technology. IEEE Pervasive Computing. Vol. 5 No. 1. 25-33
Delosieres, Laurent. and Simin Nadjm-Tehrani. (2012). Batman storeand-forward: the best of the two worlds. In Pervasive Computing and Communications Workshops (PERCOM Workshops). 2012 IEEE International Conference on 721-727. IEEE.
Suo, Hui, Jiafu Wan, Caifeng Zou, and Jianqi Liu. (2012). Security in the Internet-of-Things: a review. In Computer Science and Electronics Engineering (ICCSEE). 2012 International Conference on IEEE. Vol. 3. 648-651
Shakshuki, Elhadi M., Nan Kang, and Tarek R. Sheltami. (2013). EAACK—a secure intrusion-detection system for MANETs. IEEE Transactions on Industrial Electronics. Vol. 60. No. 2. 1089-1098.
Seither, Daniel, André König, and Matthias Hollick. (2011). Routing performance of Wireless Mesh Networks: A practical evaluation of BATMAN advanced. In Local Computer Networks (LCN). 36th Conference IEEE. 897-904.
Scheidell, Michael. (2009) Secnap Networks Security, LLC. Intrusion detection system. U.S. Patent 7,603,711.
Fielding, Roy, Jim Gettys, Jeffrey Mogul, Henrik Frystyk, Larry Masinter, Paul Leach and Tim Berners-Lee. (1999). Hypertext transfer protocol--HTTP/1.1 .No. RFC 2616.
Ge, Ying, Thomas Kunz, and Louise Lamont. (2003). Quality of service routing in ad-hoc networks using OLSR. In System Sciences. Proceedings of the 36th Annual Hawaii International Conference on 9. IEEE.
Glenn Vassallo. (2015). Code Project. [ONLINE] Available at: https://www.codeproject.com/Articles/890430/Microsoft-Azure-plusTI-CC-LaunchPad-End-to-End-Io. [Accessed 17 November 2016].
Ha, Minkeun, Kim, Seong Hoon Kim, Hyungseok Kim, Kiwoong Kwon, Nam Giang, and Daeyoung Kim. (2012). Snail gateway: Dualmode wireless access points for wifi and ip-based wireless sensor networks in the Internet-of-Things. In 2012 IEEE Consumer Communications and Networking Conference. CCNC. 169-173. IEEE.
Horng, Shi-Jinn., Ming-Yang Su, Yuan-Hsin Chen. Tzong-Wann Kao. Rong-Jian Chen.Jui-Lin Lai . and Citra Dwi Perkasa. (2011). A novel intrusion detection system based on hierarchical clustering and support vector machines. Expert systems with Applications. Vol. 38. No. 1. 306-313
JAMES, BD. (2010). Security and privacy challenges in cloud computing environments.
Johnson, David, Ntsibane Ntlatlapa, and Corinna Aichele. (2008). Simple pragmatic approach to mesh routing using BATMAN.
Wu, Kui, and Janelle Harms. (2001). QoS Support in Mobile Ad-Hoc Networks”. Crossing Boundaries – an Inter Disciplinary Journal. Vol. 1. No. 1. 92-107
Rowland, Craig H. (2002). Psionic Software, Inc. Intrusion detection system. U.S. Patent 6,405,318
Lane, Terran D. (2000). Machine learning techniques for the computer security domain of anomaly detection.
Liao, Hung-Jen, Chun-Hung Richard Lin, Ying-Chih Lin, and KuangYuan Tung. (2013). Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications. Vol. 36. No. 2. 16-24
Linehan, Paul, Shane O'neill, John Donaghy, Armin Lackermeier, and James McKee. (2003). Event queue system. U.S. Patent Application No.10/389,207.
Maindonald, J.H. (1992). Statistical design, analysis, and presentation issues. New Zealand journal of agricultural research. Vol. 35. No. 2. 121-141
Manjeshwar, Arati, and Dharma P. Agrawal. (2001). TEEN: ARouting Protocol for Enhanced Efficiency in Wireless Sensor Networks. In IPDPS. Vol. 1. 189
Rowett, Kevin, and Somsubhra Sikdar. (2005). Intrusion detection system. U.S. Patent Application 11/125,956.
Munger, Edmund Colby, Douglas Charles Schmidt, Robert Dunham Short III, Victor Larson, and Michael Williamson. (2002). Science Applications International Corporation. Agile network protocol for secure communications with assured system availability. U.S. Patent 6,502,135.
Ning, Huansheng, and Hong Liu. (2012). Cyber-physical-social based security architecture for future Internet-of-Things. Advances in Internet-of-Things. Vol. 2 No. 1. 1
Rao, KV Seshagiri, Pavel V. Nikitin, and Sander F. Lam. (2005). Antenna design for UHF RFID tags: A review and a practical application. IEEE Transactions on antennas and propagation. Vol. 53. No.12. 3870-3876.
Ramgovind, Sumant, Mariki M. Eloff, and Elme Smith. (2010). The management of security in cloud computing. In 2010 Information Security for South Africa. IEEE. 1-7.
How to Cite
TRANSFER OF COPYRIGHT AGREEMENT
The manuscript is herewith submitted for publication in the Journal of Telecommunication, Electronic and Computer Engineering (JTEC). It has not been published before, and it is not under consideration for publication in any other journals. It contains no material that is scandalous, obscene, libelous or otherwise contrary to law. When the manuscript is accepted for publication, I, as the author, hereby agree to transfer to JTEC, all rights including those pertaining to electronic forms and transmissions, under existing copyright laws, except for the following, which the author(s) specifically retain(s):
- All proprietary right other than copyright, such as patent rights
- The right to make further copies of all or part of the published article for my use in classroom teaching
- The right to reuse all or part of this manuscript in a compilation of my own works or in a textbook of which I am the author; and
- The right to make copies of the published work for internal distribution within the institution that employs me
I agree that copies made under these circumstances will continue to carry the copyright notice that appears in the original published work. I agree to inform my co-authors, if any, of the above terms. I certify that I have obtained written permission for the use of text, tables, and/or illustrations from any copyrighted source(s), and I agree to supply such written permission(s) to JTEC upon request.