2015 IEEE World Congress on Services 2015
DOI: 10.1109/services.2015.12
|View full text |Cite
|
Sign up to set email alerts
|

Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things

Abstract: The Internet of Things (IoT) devices have become popular in diverse domains such as e-Health, e-Home, e-Commerce, and e-Trafficking, etc. With increased deployment of IoT devices in the real world, they can be, and in some cases, already are subject to malicious attacks to compromise the security and privacy of the IoT devices. While a number of researchers have explored such security challenges and open problems in IoT, there is an unfortunate lack of a systematic study of the security challenges in the IoT l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
173
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 385 publications
(190 citation statements)
references
References 20 publications
0
173
0
Order By: Relevance
“…• Resource restrictions -Limited processing abilities, storage capacity and communication bandwidth allow the use of a lightweight security mechanisms only, which can prevent most of external attacks, but provide no protection from internal attacks [7].…”
Section: Security Features Of Wsnsmentioning
confidence: 99%
See 1 more Smart Citation
“…• Resource restrictions -Limited processing abilities, storage capacity and communication bandwidth allow the use of a lightweight security mechanisms only, which can prevent most of external attacks, but provide no protection from internal attacks [7].…”
Section: Security Features Of Wsnsmentioning
confidence: 99%
“…Also, they demand computational resources typically unavailable to such devices. New lightweight security mechanisms are needed and their complexity will vary depending on device specification, network technology, and type of application/service provided [7].…”
Section: Introductionmentioning
confidence: 99%
“…The adversary can access secret information and other useful data which are from RFID technology because of its wireless attribute. Before applying this attack the attacker initially captures information and data about the connected network [30]. This work is accomplishing by using some sniffing operations such port scanning applications, packet sniffer applications etc.…”
Section: ) Traffic Analysis Attackmentioning
confidence: 99%
“…In [10], Hossain et al present a comprehensive classification of attacks in a smart city. They can be made with simpler or more complex devices, provoking losses of small/big size.…”
Section: Attacks In a Smart Citymentioning
confidence: 99%
“…Smart things suffer from hardware limitations (computational and energy constraint, memory constraint, tamper resistant packaging), software restrictions (embedded software constraint, dynamic security patch), hard network-requirements (mobility, scalability, multiplicity of devices, multiplicity of communication medium, multi-protocol networking, dynamic network topology). [10] These resource-constraints restrict the inclusion of adequate security mechanisms (e.g., cryptography) directly in smart objects. In consequence, designers let the security aside, hoping it could be add lateron, and attack-resistance is usually losing the race against other design-factors, as good performance, small form, and low energy consumption.…”
Section: Introductionmentioning
confidence: 99%