Summarize the Security Issues of Internet of Things and Prospect of Future Trends

Article Preview

Abstract:

In the past decade, Internet of Things (IoT) has experienced a rapid development, but the accompanied security problems were discussed rarely. To some extent, it restricted the development of IoT. This paper summarized the security characters of IoT, discussed relevant security issues of different layers, especially in the perception layer. Finally from the aspect of some emerging technologies, this paper prospected the future develop trends of IoT.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2600-2604

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] R.H. Weber, Internet of things-new security and privacy challenges, Computer Law & Security Review, vol. 26, pp.23-30, (2010).

DOI: 10.1016/j.clsr.2009.11.008

Google Scholar

[2] Hui Suo, Jiafu Wan, Caifeng Zou and Jianqi Liu, Security in the Internet of Things: A review, 2012 International Conference on Computer Science and Electronics Engineering, HangZhou: 2012. 648-651.

DOI: 10.1109/iccsee.2012.373

Google Scholar

[3] Dong chen, Guiran Chang, Lizhong Jin, Xiaodong Ren, Jiajia Li, and Fengyun Li, A novel Secure Architecture for the Internet of Things, 2011 Fifth International Conference on Genetic and Evolutionary Computing, TaiWan.

DOI: 10.1109/icgec.2011.77

Google Scholar

[4] Alex X. Liu, LeRoy A. Bailey, A privacy and authentication protocol for passive RFID tags, Computer Communications 32(2009).

DOI: 10.1016/j.comcom.2009.03.006

Google Scholar

[5] N. Sastry and D. Wagner, Security considerations for IEEE802. 15. 4 networks, " in Proceedings of the ACM Workshop on Wireless Security (WiSe , 04), p.32–42, Philadelphia, Pa, USA, October (2004).

Google Scholar

[6] John Lee, Hua Zhou, Zhihong Liang, Xiangcheng Wan, and Yuhong chen, The Wireless Sensor Network Security Protocol Research in Internet of Things, Advances in ECWAC, Vol. 2, AISC 149, p.241–247.

Google Scholar

[7] Yang Xiao, Hslao-Hwa Chen, Bo Sun, Ruhal Wang, and Sakshl Sethl, MAC Security and Security Overhead Analysis in the IEEE 802. 15. 4 Wireless Sensor Networks, EURASIP Journal onWireless Communications and Networking, Volume 2006, Article ID 93830, Pages 1–12.

DOI: 10.1155/wcn/2006/93830

Google Scholar