A Review on Internet of Things (IoT): Security and Privacy Requirements and the Solution Approaches

α
Muhammad A Iqbal
Muhammad A Iqbal Ph.D Computer Science
σ
Muhammad A. Iqbal
Muhammad A. Iqbal
ρ
Oladiran G. Olaleye
Oladiran G. Olaleye
Ѡ
Magdy A. Bayoumi
Magdy A. Bayoumi
α University of Louisiana at Lafayette

Send Message

To: Author

A Review on Internet of Things (IoT): Security and Privacy Requirements and the Solution Approaches

Article Fingerprint

ReserarchID

CSTNWSA1E58

A Review on Internet of Things (IoT): Security and Privacy Requirements and the Solution Approaches Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

The world is undergoing a dramatic rapid transformation from isolated systems to ubiquitous Internet-based-enabled ‘things’ capable of interacting each other and generating data that can be analyzed to extract valuable information. This highly interconnected global network structure known as Internet of Things will enrich everyone’s life, increase business productivity, improve government efficiency, and the list just goes on. However, this new reality (IoT) built on the basis of Internet, contains new kind of challenges from a security and privacy perspective. Traditional security primitives cannot be directly applied to IoT technologies due to the different standards and communication stacks involved.

References

33 Cites in Article
  1. R Somayya Madakam,Siddharth Ramaswamy,Tripathi ; Emmanouil,Jorg Vasilomanolakis,Manisha Daubert,Vangelis Luthra,Alex Gazis,Panayotis Wiesmaie,Kikiras (2013). Internet of Things (IoT): A Literature Review.
  2. R Bonetto,N Bui,V Lakkundi,A Olivereau,A Serbanati,M Rossi (2012). Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples.
  3. Christian Dancke,Tuen Security in Internet of Things Systems.
  4. Sepideh Fouladgar,Bastien Mainaud,Khaled Masmoudi,Hossam Afifi (2006). Tiny 3-TLS: a trust delegation protocol for wireless sensor networks.
  5. Vipul Gupta,Matthew Millard,Stephen Fung,Yu Zhu,Nils Gura,Hans Eberle,Sheueling Chang Shantz (2005). Sizzle: A Standards-Based End-to-End Security Architecture for the Embedded Internet (Best Paper).
  6. Yosra Saied,Alexis Olivereau,Djamal Zeghlache,Maryline Laurent (2014). Lightweight collaborative key establishment scheme for the Internet of Things.
  7. R Hummen,H Shafagh,S Raza,T Voigt,K Wehrle (2014). Delegation based Authentication and Authorization for the IP-based Internet of Things.
  8. K Ashton (2009). That 'Internet of Things' thing.
  9. Magdy Muhammad A Iqbal,Bayoumi (2016). Secure End-to-End Key Establishment Protocol for Resource-Constrained Healthcare Sensors in the Context of IoT.
  10. A Menezes,S Vanstone,P Van Oorschot (1996). Handbook of Applied Cryptography.
  11. Jennifer Steiner,B Neuman,Jeffrey Schiller (1988). Kerberos: An authentication service for open network systems.
  12. E Rescorla,N Modadugu (2012). Datagram Transport Layer Security Version 1.2.
  13. R Moskowitz,R Hummen (2012). HIP Diet EXchange (DEX).
  14. T Kivinen (2012). Minimal IKEv2.
  15. Rene Hummen,Hanno Wirtz,Jan Ziegeldorf,Jens Hiller,Klaus Wehrle (2013). Tailoring end-to-end IP security protocols to the Internet of Things.
  16. S Santesson,H Tschofenig (2014). Transport Layer Security (TLS) Cached Information Extension.
  17. Thomas Kothmayr,Corinna Schmitt,Wen Hu,Michael Brünig,Georg Carle (2013). DTLS based security and two-way authentication for the Internet of Things.
  18. Y Saied,A Olivereau (2012). D-HIP: A distributed key exchange scheme for HIP-based Internet of Things.
  19. Pawani Porambage,An Braeken,Andrei Gurtov,Mika Ylianttila,Susanna Spinsante (2015). Secure end-to-end communication for constrained devices in IoT-enabled Ambient Assisted Living systems.
  20. Internet of Things: An overview.
  21. Emmanouil Vasilomanolakis,Jorg Daubert,Manisha Luthra,Vangelis Gazis,Alex Wiesmaier,Panayotis Kikiras (2015). On the Security and Privacy of Internet of Things Architectures and Systems.
  22. Jorg Daubert,Alexander Wiesmaier,Panayotis Kikiras (2015). A view on privacy & trust in IoT.
  23. H Sundmaeker,P Guillemin,P Friess,S Woelfflé (2010). Vision and Challenges for Realising the Internet of Things.
  24. Bruce Ndibanje,Hoon-Jae Lee,Sang-Gon Lee (2014). Security Analysis and Improvements of Authentication and Access Control in the Internet of Things.
  25. Benjamin Kleine,Bethany Lobo,Levendowski Amanada,March (2015). Internet of Things: The new frontier for data security and privacy.
  26. M Reiser,U Attenberger (2015). Künstliche Intelligenz in der Radiologie.
  27. W Ahmad,Andrew Atamli,Martin (2014). Threat-Based Security Analysis for the Internet of Things.
  28. Rolf Weber (2010). Internet of Things – New security and privacy challenges.
  29. Mohamed Abomhara,Geir Koien (2014). Security and privacy in the Internet of Things: Current status and open issues.
  30. Riccardo Bonetto,Nicola Bui,Vishwas Lakkundi,Alexis Olivereau,Alexandru Serbanati,Michele Rossi (2012). Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples.
  31. T Dierks,E Rescorla (2008). The Transport Layer Security (TLS) Protocol Version 1.2.
  32. Gunter Sch,¨ Afer (2003). ¨ Security in fixed and wireless networks -an introduction to securing data communications.
  33. S Kent,R Atkinson (1998). Security Architecture for the Internet Protocol.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Muhammad A Iqbal. 2017. \u201cA Review on Internet of Things (IoT): Security and Privacy Requirements and the Solution Approaches\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 16 (GJCST Volume 16 Issue E7): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
C.2.0 K.4.1
Version of record

v1.2

Issue date

January 24, 2017

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 7219
Total Downloads: 1782
2026 Trends
Related Research

Published Article

The world is undergoing a dramatic rapid transformation from isolated systems to ubiquitous Internet-based-enabled ‘things’ capable of interacting each other and generating data that can be analyzed to extract valuable information. This highly interconnected global network structure known as Internet of Things will enrich everyone’s life, increase business productivity, improve government efficiency, and the list just goes on. However, this new reality (IoT) built on the basis of Internet, contains new kind of challenges from a security and privacy perspective. Traditional security primitives cannot be directly applied to IoT technologies due to the different standards and communication stacks involved.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

A Review on Internet of Things (IoT): Security and Privacy Requirements and the Solution Approaches

Muhammad A. Iqbal
Muhammad A. Iqbal
Oladiran G. Olaleye
Oladiran G. Olaleye
Magdy A. Bayoumi
Magdy A. Bayoumi

Research Journals