Reference Hub1
Mechanisms to Secure Communications in the IoT

Mechanisms to Secure Communications in the IoT

Azeddine Bilami, Somia Sahraoui
ISBN13: 9781522522966|ISBN10: 1522522964|EISBN13: 9781522522973
DOI: 10.4018/978-1-5225-2296-6.ch007
Cite Chapter Cite Chapter

MLA

Bilami, Azeddine, and Somia Sahraoui. "Mechanisms to Secure Communications in the IoT." Security Breaches and Threat Prevention in the Internet of Things, edited by N. Jeyanthi and R. Thandeeswaran, IGI Global, 2017, pp. 142-173. https://doi.org/10.4018/978-1-5225-2296-6.ch007

APA

Bilami, A. & Sahraoui, S. (2017). Mechanisms to Secure Communications in the IoT. In N. Jeyanthi & R. Thandeeswaran (Eds.), Security Breaches and Threat Prevention in the Internet of Things (pp. 142-173). IGI Global. https://doi.org/10.4018/978-1-5225-2296-6.ch007

Chicago

Bilami, Azeddine, and Somia Sahraoui. "Mechanisms to Secure Communications in the IoT." In Security Breaches and Threat Prevention in the Internet of Things, edited by N. Jeyanthi and R. Thandeeswaran, 142-173. Hershey, PA: IGI Global, 2017. https://doi.org/10.4018/978-1-5225-2296-6.ch007

Export Reference

Mendeley
Favorite

Abstract

The maturity of the IoT depends on the security of communications and the protection of end-user's privacy. However, technological and material heterogeneities, and the asymmetric nature of communications between sensor nodes and ordinary Internet hosts, make the security in this case more problematic. Major problem facing the large deployment of IoT is the absence of a unified architecture and a lack of common agreement in defining protocols and standards for IoT parts. Many solutions have been proposed for the standardization of security concepts and protocols in IoT at different layers. Even though many advances and proposals were made for IoT adaptation as IPv6 for Low Power Wireless Personal Area Network (6LoWPAN), and at application layer with protocols such as XMPP, MQTT, CoAP, etc., security of the IoT remains a very challenging task and an open research topic. This chapter focuses on existing protocols and different proposed mechanisms in literature to secure communications in the IoT.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.