Advertisement

A Secured Communication Model for IoT

  • Reza Hosenkhan
  • Binod Kumar Pattanayak
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 863)

Abstract

In the current scenario, global Internet is oriented around human-to-human communication only. With the emergence of Internet of Things (IoT), this communication is supposed to be transformed to a communication between everything using the services of global Internet where human-to-human, human-to-machine, and machine-to-machine communications are made viable. With billions of smart devices referred to as “things” being connected to the global Internet, the major concern arises around the security aspects of IoT. In this paper, we address a publish/subscribe security model for IoT which can usefully contribute to secured communications on IoT.

Keywords

IoT Security Smart devices Communication 

References

  1. 1.
    Vermesco, O., Harrison, M., Vogt, H., Kalabourkas, K., Tomasellar, M., Wouters, K., Glusmessli, S., Haller, S.: Internet of Things: Strategic Research Roadmap (2009)Google Scholar
  2. 2.
    Burel, B., Barker, L., Divitini, M., Peret, F.A.F, Russell, I., Siever, B., Tudor, L.: Courses, content and tools for internet of things in computer science edcuation. In: Proceedings of ITICSE Conference on Working Group Reports, pp. 125–139, Italy (2017)Google Scholar
  3. 3.
    Granjal, J., Monterio, E., Silva, J.S.: Security for the internet of things. A survey of existing protocols and open research issues. IEEE Commun. Surv. Tutorials 17(3), 1294–1312 (2015)CrossRefGoogle Scholar
  4. 4.
    Riachi, A., Challal, Y., Natalizio, E., Chtourou, Z., Bouabadallah, A.: A systemic approach for IoT security. In: IEEE Dcoss, pp. 351–355 (2013)Google Scholar
  5. 5.
    Kahn, R., Khan, S.V., Zaheer, R., Khan, S.: Future internet: the internet of things architecture, possible applications and key challenges, possible applications and key challenges. In: Proceedings of 10th International Conference on Frontiers of Information Technology (“FIT”), pp. 257–260 (2012)Google Scholar
  6. 6.
    Babar, S., Stango, A., Prasad, N., Sen, J., Prasad R.: Proposed embedded security framework for internet of things (“IoT”). In: Proceedings of 2nd, IEEE Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic systems Technology (“VITAE”), pp. 1–6 (2011)Google Scholar
  7. 7.
    Ahmed, A.W., Ahmed, M.M., Khan, O.A., Shah, M.A.: A comprehensive analysis on the security threats and their countermeasures of IoT. Int. J. Adv. Comput. Sci. Appl. (“IJACSA”) 8(7), 489–501 (2017)Google Scholar
  8. 8.
    Pandey, E., Gupta, V.: An analysis of security issues of internet of things (IoT). Int. J. Adv. Res. Comput. Sci. Softw. Eng. (“IJARCSSE”) 5(11), 768–773 (2015)Google Scholar
  9. 9.
    Suchitra, C., Vandana, C.P.: Internet of things and security issues. Int. J. Comput. Sci. Mob. Comput (“IJCSMC”) 5(1), 133–139 (2016)Google Scholar
  10. 10.
    Qiang, C., Quan, G., Yu, B., Yang, L.: Research on security issues on the internet of things. Int. J. Future Gener. Commun. Networking (IJFGCN) 6(6), 1–10Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Université des MascareignesBeau Bassin-Rose HillMauritius
  2. 2.Siksha ‘O’ Anusandhan Deemed to be UniversityBhubaneswarIndia

Personalised recommendations