Security in Context of the Internet of Things: A Study

Security in Context of the Internet of Things: A Study

Copyright: © 2019 |Pages: 40
DOI: 10.4018/978-1-5225-5742-5.ch001
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The chapter discusses various security challenges in the design of the internet of things and their possible solutions. After presenting a precise introduction to the internet of things, its applications, and technologies enabling it, the chapter discusses its various architectures and models which follow with an introduction of development kits, boards, platforms, hardware, software, and devices used in the internet of things. A concise explanation and discussion on the internet of things standards and protocols with emphasis on their security is presented. Next, various possible security threats and attacks to the internet of things are presented. The subsequent sections of the chapter discuss identified security challenges at individual layers of various models along with their possible solutions. It further presents cryptographic and lightweight cryptographic primitives for the internet of things, existing use of cryptography in the internet of things protocols, security challenges, and its prospectus.
Chapter Preview
Top

Introduction

The Internet of Things (IoT) is a technological revolution in the field of computing and communications due to practical and rapid innovation in many technologies including Internet, computing, artificial intelligence, data processing, communications, sensors, processors, networks, control and many other technologies underlying it. Web of Things, Internet of Objects, Embedded Intelligence, and Connected Devices are some of the aliases used for this technological revolution. It involves a very high prevalence of entities called things which have unique identities on the Internet and communicate to transfer data over it. Several other computing technologies such as Cyber-Physical Systems, Pervasive Computing, Ubiquitous Computing or Calm technology, Machine-to-Machine Interaction, Human-Computer Interaction, and Ambient Intelligence have a very close resemblance with the Internet of Things. Kevin Ashton is believed to have first used the term ‘Internet of Things’. Though no uniquely agreed definition of this term has been agreed upon by academicians, researchers, practitioners, innovators, developers, and corporates, however, the definition given by ITU-T Y.2060 is most widely used. The term ‘Internet of Things’ is defined by ITU-T Y.2060 as: “a global infrastructure for the information society, enabling advanced services by interconnecting (physical and virtual) things based on existing and evolving interoperable information and communication technologies”. Further in the context of the Internet of Things, it defines ‘Things’ as: ‘a piece of equipment with the mandatory capabilities of communication and the optional capabilities of sensing, actuation, data capture, data storage, and data processing’. A significant focus in this definition is on the edge devices. The services offered by or through the cloud such as ‘data collection,’ ‘brokerage and storage,’ ‘data analytics,’ ‘inventory and sensor management,’ ‘visualization and monitoring,’ and ‘device relationship’ play an important a role in the successful implementation of its capabilities. The Internet of Things can be realized as a centralized system, or a distributed system or a combination of both. In the centralized approach, objects, i.e., ‘Things’ are connected to centralized cloud infrastructures while as in distributed approach ‘Things’ at the edge of the network collaborate without the requirement of centralized control. All of these approaches create a worldwide network of interconnected objects. These objects range from human beings to everyday objects such as cars, appliances, etc. and specialized tools such as industrial machinery, medical devices, etc. All of these objects can behave as producers and consumers of services, and can also communicate directly or indirectly with each other. Internet of Things may be either cloud-centric or distributed. In a centralized approach of IoT, acquisition networks provide data to the Cloud. The requirements of various IoT applications: from eHealth to retail, from logistics to smart city management can be fulfilled using this approach. In this distributed approach of IoT, multiple entities located at the edge of the network can locally and remotely collaborate without depending on a purely centralized infrastructure.

Complete Chapter List

Search this Book:
Reset