Security in the Internet of Things

Security in the Internet of Things

Ahmed Maarof, Mohamed Senhadji, Zouheir Labbi, Mostafa Belkasmi
Copyright: © 2018 |Pages: 17
DOI: 10.4018/978-1-5225-5736-4.ch006
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In this chapter, the authors present a review of security requirements for IoT and provide an analysis of the possible attacks, security issues, and major security threats from the perspective of layers that comprise IoT. To overcome these limitations, the authors describe a security implementation challenges in IoT security. This chapter serves as a manual of security threats and issues of the IoT and proposes possible solutions and recommendations for improving security in the IoT environment.
Chapter Preview
Top

Security Requirements For The Internet Of Things

The data security and privacy are the most potential risks associated with the IoT. Privacy risks will be increased in the IoT as the complexity provides more vulnerability that is related to the service. In IoT, much information corresponds to personal information, such as budgets and date of birth, etc. This aspect requires a big data challenging, so the designer should pay more attention to the security and they should design security solutions in a big enough range for all parts in IoT.

The IoT should be implemented in a legitimate, politically, socially and acceptable way, where legal challenges, business challenges and technical challenges should be considered. Security must be addressed all along the IoT lifecycle from the initial design to the services running. The main research challenges in IoT scenario include the data confidentiality, privacy, and trust, as shown in Weber (2013), Gaur (2013), Di Pietro et al. (2014), Furnell (2007), Miorandi et al. (2012), and Roman et al. (2013).

Figure 1.

Security Issues in IoT

978-1-5225-5736-4.ch006.f01

The IoT environment is built on four layers which are physical, network, perception and application layers, as shown in Figure 2 (Miorandi, 2012; Sonar, 2011).

Figure 2.

IoT as a layered approach

978-1-5225-5736-4.ch006.f02

Complete Chapter List

Search this Book:
Reset