Security in Network Layer of IoT: Possible Measures to Preclude

Security in Network Layer of IoT: Possible Measures to Preclude

B. Balamurugan, Dyutimoy Biswas
DOI: 10.4018/978-1-5225-9866-4.ch011
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The internet of things (IoT) is an imminent model in the field of wireless telecommunications. It is also considered as a third wave of information technology after the Internet and mobile communication. Basically, IoT is a wireless interconnected network of variety of objects such as radio frequency identification (RFID) tags, sensors, actuators, mobile phones and other types of wireless devices. It has extensible application in the areas such as public security, infrastructure development, modern agriculture, environment protection, urban management, healthcare, enhanced learning, and business service, among others. IoT is a self-configuring wireless network of sensors where the primary goal of establishing connection is to offer interconnectivity of various objects. The concept of IoT was coined by the Auto-Id center of the Massachusetts Institute of Technology (MIT) in 1999
Chapter Preview
Top

Introduction

Internet of things (IoT) is an amazing, if not the most powerful technological invention of the last couple of decades, providing superior power to the hands of human race. The most promising aspect of IoT is that this technology is still budding and has immense potential to kick-start a new, fully coordinated technological era. In IoT, ‘things’ or devices communicate between each other over wireless networks. Therefore, while developing algorithms and techniques for IoT, the standards and rules set for wireless networks, which are essentially different from that of wired networks, are taken into consideration. Since IoT is still in its inception stage, its usage is still limited within the scope of the enterprises and not very common in consumer market. Therefore, unlike the high speed network where computers communicate with other computers where aspects of ‘security breaches’ is dealt by the programmers and developers for ages, and many robust techniques for this purpose have been built and used, in IoT, with fewer, if not zero, number of cases of security breaches have occurred, apart from standard techniques, it’s a challenge for the engineers to develop techniques, both on hardware and software levels, to secure the future of IoT (Kelly et al., 2013; Babar et al., 2010; Alam, Sarfraz, Chowdhury, & Noll, 2011; Barnaghi et al., 2012).

In IoT, the new objects that enter the network are configured automatically. This characteristic makes IoT highly susceptible to security threats. Among several kinds of threats in an IoT network, Disruption and Denial of Service (DoS), eavesdropping, problems in authentication and physical attacks on devices in different forms, are most common.

Therefore, it is essential to devise security measures without interfering with the operation of the IoT network. Also, robust and bug-free analytical tools and algorithms should be employed that will detect malicious and unethical activity, whilst improving service offered to the customers. Generally, the intrusion detection and prevention systems and enhancement of packet security by incorporating suitable fields in packet header are the security measures associated with the Layer 3 of wireless networks (Babar et al., 2010; Zargar et al., 2013; Savola, Reijo, Abie, & Sihvonen, 2012).

Complete Chapter List

Search this Book:
Reset