A New Efficient and Secure Architecture Model for Internet of Things
Abstract
Internet of Things (IoT) is considered as one of the latest intelligent communication technologies in the world. IoT has been growing in different architectural designs which contributes to the connection between heterogeneous IoT devices. Although, there are many different IoT architectures have been proposed, but they are still suffering from many challenges such as standardization, security, and privacy. This paper will focus on reviewing some existing IoT architectures used to provide security and privacy for IoT networks. Moreover, this paper will introduce a novel IoT security architecture model named IoT-EAA. IoT-EAA tends to satisfy different requirements of IoT security. Hence, the novelty of the proposed IoT-EAA architecture model comes from an important layer called the security layer. This layer employs an external and internal security service against different attacks for each layer within the IoT-EAA architecture model. The proposed architecture model is compared to existing IoT architectures based on several criteria such as security, power and time consumption. Therefore, the proposed IoT-EAA increases security and decrease the power and time consumption, which consider an important contribution to improving the performance of IoT architecture.
Keywords
Internet of Things (IoT) IoT architecture IoT security PrivacyReferences
- 1.Farooq MU, Waseem M, Khairi A, Mazhar S (2015) A critical analysis on the security concerns of internet of things (IoT). Int J Comput Appl 111(7)Google Scholar
- 2.Soumyalatha SGH (2016, May) Study of IoT: understanding IoT architecture, applications, issues and challenges. In: 1st International conference on innovations in computing & networking (ICICN16), CSE, RRCE. Int J Adv Netw ApplGoogle Scholar
- 3.Rani P, Sri Lakshmi G (2017) IoT vulnerabilities and security. Int J 2:6Google Scholar
- 4.Aldosari HM (2015) A proposed security layer for the Internet of things communication reference model. Procedia Comput Sci 65:95–98CrossRefGoogle Scholar
- 5.Bassi A, Bauer M, Fiedler M, Kranenburg RV (2013) Enabling things to talk. Springer-Verlag GmbHGoogle Scholar
- 6.Liu X, Zhao M, Li S, Zhang F, Trappe W (2017) A security framework for the internet of things in the future internet architecture. Future Internet 9(3):27CrossRefGoogle Scholar
- 7.Kamel SOM, Hegazi NH (2018) A proposed model of IoT security management system based on a study of internet of things (IoT) security. Int J Sci Eng Res 9(9):1227 ISSN 2229-5518Google Scholar
- 8.Alhamedi AH, Snasel V, Aldosari HM, Abraham A (2014, July) Internet of things communication reference model. In: 2014 6th International conference on computational aspects of social networks (CASoN). IEEE, pp 61–66Google Scholar
- 9.Zhang Y (2011, September) Technology framework of the internet of things and its application. In 2011 International conference on electrical and control engineering. IEEE, pp 4109–4112Google Scholar
- 10.Fremantle P (2014) A reference architecture for the internet of things. WSO2 White paperGoogle Scholar
- 11.Kim JT (2015) Requirement of security for IoT application based on gateway system. Communications 9(10):201–208CrossRefGoogle Scholar
- 12.Burmester M, De Medeiros B (2007, April) RFID security: attacks, countermeasures and challenges. In: The 5th RFID academic convocation, the RFID journal conferenceGoogle Scholar
- 13.Mitrokotsa A, Rieback MR, Tanenbaum AS (2010) Classification of RFID attacks. Gen 15693:14443Google Scholar
- 14.Li L (2012, May) Study on security architecture in the Internet of Things. In: Proceedings of 2012 international conference on measurement, information and control, vol 1. IEEE, pp 374–377Google Scholar
- 15.Douceur JR (2002, March) The sybil attack. In: International workshop on peer-to-peer systems. Springer, Berlin, Heidelberg, pp 251–260CrossRefGoogle Scholar
- 16.Ahmed N, Kanhere SS, Jha S (2005) The holes problem in wireless sensor networks: a survey. ACM SIGMOBILE. Mobile Computing and Communications Review 9(2): 4–18CrossRefGoogle Scholar
- 16.Bhattasali T, Chaki R, Sanyal S (2012) Sleep deprivation attack detection in wireless sensor network. arXiv preprint arXiv:1203.0231
- 17.Padmavathi DG, Shanmugapriya M (2009) A survey of attacks, security mechanisms and challenges in wireless sensor networks. arXiv preprint arXiv:0909.0576
- 18.Fulare PS, Chavhan N (2011) False data detection in wireless sensor network with secure communication. Int J Smart Sens Ad Hoc Netw (IJSSAN) 1(1):66–71Google Scholar
- 19.Farooq MU, Waseem M, Khairi A, Mazhar S (2015) A critical analysis on the security concerns of internet of things (IoT). Int J Comput Appl 111(7)Google Scholar
- 20.Padhy RP, Patra MR, Satapathy SC (2011) Cloud computing: security issues and research challenges. Int J Comput Sci Inf Technol Secur (IJCSITS) 1.2:136–146Google Scholar
- 21.Thakur BS, Chaudhary S (2013) Content sniffing attack detection in client and server side: a survey. Int J Adv Comput Res 3(2):7Google Scholar