Layer-wise Security Challenges and a Secure Architectural Solution for Internet of Things at Physical, Network and Application Layers

Sriranga Narasimha Gandhi Aryavalli
Sriranga Narasimha Gandhi Aryavalli Dr.
Hemantha Kumar
Hemantha Kumar
University of Mysore University of Mysore

Send Message

To: Author

Layer-wise Security Challenges and a Secure Architectural Solution for Internet of Things at Physical, Network and Application Layers

Article Fingerprint

ReserarchID

73UE4

Layer-wise Security Challenges and a Secure Architectural Solution for Internet of Things at Physical, Network and Application Layers Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu
Font Type
Font Size
Font Size
Bedground

Abstract

In recent years, the Internet of Things has emerged as one of the most important technologies of the twenty-first century. We can now connect everyday objects to the internet via embedded devices such as kitchen appliances, cars, thermostats, and baby monitors, allowing for seamless communication between people, processes, and things. Because of low-cost computing, the cloud, big data, analytics, and mobile technologies, physical things can share and collect data with minimal human intervention. In this hyper-connected world, digital systems can record, monitor, and adjust every interaction between connected things. The physical and digital worlds intersect and work together. By enabling connected cars, IoT is reinventing the automobile.

Generating HTML Viewer...

References

30 Cites in Article
  1. Sriranga Narasimha,Gandhi Aryavalli,Hemantha Kumar (2022). Top 12 layer-wise security challenges and a secure architectural solution for Internet of Things, Special section VSI-iotl.
  2. Jürgen Dürrwang,Johannes Braun,Marcel Rumez,Reiner Kriesten (2017). Security Evaluation of an Airbag-ECU by Reusing Threat Modeling Artefacts.
  3. John Haldon (2017). Gregory I. Halfond, ed., <i>The Medieval Way of War: Studies in Medieval Military History in Honor of Bernard S. Bachrach</i>. Farnham, Surrey, UK: Ashgate, 2015. Pp. xvi, 332; 18 black-and-white figures. $129.95. ISBN: 978-1-4724-1958-3.Table of contents available online at https://www.routledge.com/The-Medieval-Way-of-War-Studies-in-Medieval-Military-History-in-Honor/Halfond/p/book/9781472419583 (accessed 23 May 2016);.
  4. E Hira (2017). Automotive Electronic Control Unit (ECU) Market Size Share.
  5. Pal-Stefan Murvay,Bogdan Groza (2018). Security Shortcomings and Countermeasures for the SAE J1939 Commercial Vehicle Bus Protocol.
  6. S Mukherjee,H Shirazi,I Ray,J Daily,R Gamble (2016). Practical DoS Attacks on Embedded Networks in Commercial Vehicles.
  7. B Groza,S Murvay (2018). Security solutions for the Controller Area Network: Bringing Authentication to In-Vehicle Networks.
  8. T Hoppe,J Dittman (2007). Sniffing/Replay Attacks on CAN Buses: A simulated attack on the electric window lift classified using an adapted CERT taxonomy.
  9. A Taylor,N Japkowicz,S Leblanc (2015). Frequencybased anomaly detection for the automotive CAN bus.
  10. Y Hamada,Y Miyashita,Y Hata,M Inoue,H Ueda (2018). Anomaly-based intrusion detection using the density estimation of reception cycle periods for invehicle networks.
  11. A Greenberg (2015). Hackers Remotely Kill a Jeep on the Highway.
  12. Karl Koscher,Alexei Czeskis,Franziska Roesner,Shwetak Patel,Tadayoshi Kohno,Stephen Checkoway,Damon Mccoy,Brian Kantor,Danny Anderson,Hovav Shacham,Stefan Savage (2010). Experimental Security Analysis of a Modern Automobile.
  13. Andrea Palanca,Eric Evenchick,Federico Maggi,Stefano Zanero (2017). A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks.
  14. Tobias Hoppe,Stefan Kiltz,Jana Dittmann (2011). Security threats to automotive CAN networks—Practical examples and selected short-term countermeasures.
  15. S Nie,L Liu,Y Du (2017). Wireless Hacking.
  16. Ai Generated (2018). Session Summary Podcast: Session 4: Security Testing.
  17. Subhojeet Mukherjee,Hossein Shirazi,Indrakshi Ray,Jeremy Daily,Rose Gamble (2016). Practical DoS Attacks on Embedded Networks in Commercial Vehicles.
  18. (2018). Automotive Electronics Cost as A Percentage of Total Car Cost Worldwide from 1950 to 2030.
  19. S Checkoway,D Mccoy,B Kantor,D Anderson,H Shacham,S Savage,K Koscher,A Czeskis,F Roesner,T Kohno (2014). Comprehensive experimental analyses of automotive attack surfaces.
  20. Shaibal Chakrabarty,Daniel Engels,Selina Thathapudi (2015). Black SDN for the Internet of Things.
  21. Zhijing Qin,Grit Denker,Carlo Giannelli,Paolo Bellavista,Nalini Venkatasubramanian (2014). A Software Defined Networking architecture for the Internet-of-Things.
  22. Y Lu (2017). Sdtcp: Towards datacenter tcp congestion control with sdn for iot applications.
  23. Rohit Das,Nurzaman Ahmed,Fabiola Pohrmen,Arnab Maji,Goutam Saha (2020). 6LE-SDN: An Edge-Based Software-Defined Network for Internet of Things.
  24. A Hesham (2017). A simplified network access control design and implementation for m2m communication using sdn.
  25. Prajit Das,Sandeep Narayanan,Nitin Sharma,Anupam Joshi,Karuna Joshi,Tim Finin (2016). Context-Sensitive Policy Based Security in Internet of Things.
  26. Amit Levy,James Hong,Laurynas Riliskis,Philip Levis,Keith Winstein (2016). Beetle.
  27. James Hong,Amit Levy,Philip Levis (2016). Demo.
  28. Antonio Neto,Artur Souza,Italo Cunha,Michele Nogueira,Ivan Nunes,Leonardo Cotta,Nicolas Gentille,Antonio Loureiro,Diego Aranha,Harsh Patil,Leonardo Oliveira (2016). AoT.
  29. C.-J Liang (2015). Sift: building an internet of safe things.
  30. Attila Yavuz (2013). ETA.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Sriranga Narasimha Gandhi Aryavalli. 2026. \u201cLayer-wise Security Challenges and a Secure Architectural Solution for Internet of Things at Physical, Network and Application Layers\u201d. Global Journal of Research in Engineering - G: Industrial Engineering GJRE-G Volume 23 (GJRE Volume 23 Issue G1).

Download Citation

Intrusion detection system for secured architecture architecture.
Journal Specifications

Crossref Journal DOI 10.17406/gjre

Print ISSN 0975-5861

e-ISSN 2249-4596

Keywords
Classification
GJRE-G Classification DDC Code: 004.678 LCC Code: QA76.9.B45
Version of record

v1.2

Issue date
February 28, 2023

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 1423
Total Downloads: 31
2026 Trends
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Layer-wise Security Challenges and a Secure Architectural Solution for Internet of Things at Physical, Network and Application Layers

Sriranga Narasimha Gandhi Aryavalli
Sriranga Narasimha Gandhi Aryavalli <p>University of Mysore</p>
Hemantha Kumar
Hemantha Kumar

Research Journals