A Critical Analysis on the Security Architectures of Internet of Things: The Road Ahead

Journal of Intelligent Systems 27 (2):149-162 (2018)
  Copy   BIBTEX

Abstract

Internet of Things has been a most important research area for almost a decade now, where a huge network of billions or trillions of “things” communicating with one another is facing many technical and application challenges. Although there are many uncertainties about its security and privacy, the literature presents different techniques to handle the security issues and challenges in order to develop a well-defined security architecture. This paper reviews 50 research papers that are related to the security of IoT. The security techniques were classified with respect to time consumption, energy consumption, power consumption, lightweight property, reliability, robustness, and smart applicability. Also, the security techniques were analyzed based on the considered attacks, application, utilized simulation tool, security model, and attributes. The objective of the survey is focused on the security loopholes arising out of the information exchange technologies used in IoT. Finally, the important research issues are addressed for the researchers to find the way for further research in the security of IoT. The survey signifies that multilevel and mutual authentication based on attribute-based profile modeling bring more security for access control and authentication.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,881

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Internet Capital.Russell Hardin - 2004 - Analyse & Kritik 26 (1):122-138.
Linguistic representations: the road ahead.R. C. Pradhan (ed.) - 2012 - New Delhi: Decent Books.
Desiderata for cognitive architectures.Ron Sun - 2004 - Philosophical Psychology 17 (3):341-373.
Security: Against What? For What? With What?André Gorz - 1983 - Telos: Critical Theory of the Contemporary 1983 (58):158-168.
Wang Chuan-Shan on the Relationship between Ying-Yang and Dao.Chi-chu Chen - 2002 - Philosophy and Culture 29 (11):1032-1039.
Internet Addiction and Well-Being: Daoist and Stoic Reflections.Hui Jin & Edward H. Spence - 2016 - Dao: A Journal of Comparative Philosophy 15 (2):209-225.

Analytics

Added to PP
2017-12-14

Downloads
7 (#1,387,247)

6 months
4 (#790,394)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references