A Review on IoT Security Architecture: Attacks, Protocols, Trust Management Issues, and Elliptic Curve Cryptography

  • Lalita AgrawalEmail author
  • Namita Tiwari
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 100)


Internet of Things has become popular for the industrial and commercial environment and also for research purpose by providing a large number of applications that facilitate human daily and social life more comprehensible and convenient. Internet of Things amalgamates various kinds of sensors, actuators, and physical object to communicate with each other directly even in the absence of a human. For the formation of the IoT-equipped devices and network, security and trust among various parties are major concerns. Here, we discuss the security and privacy available at each layer of the IoT model and also the limitation and future direction that can be implemented to enhance IoT security architecture. However, trustworthy channel must be necessary for secure communication, and here, we also discuss elliptic curve light-weighted encryption technology used for trust management in IoT.


Internet of Things (IoT) Security Attacks Protocol Trust management Elliptic curve cryptography (ECC) 


  1. 1.
    Alaba FA, Othman M, Hashem IAT, Alotaibi F (2017) Internet of things security: a survey. J Netw Comput Appl 88:10–28CrossRefGoogle Scholar
  2. 2.
    Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54:2787–2805CrossRefGoogle Scholar
  3. 3.
    Fraga-Lamas P, Fernández-Caramés TM, Suárez-Albela M, Castedo L, González-López M (2016) A review on internet of things for defense and public safety. Sensors MDPIGoogle Scholar
  4. 4.
    Farooq MU, Waseem M, Khairi A, Mazhar S (2015) A critical analysis on the security concerns of internet of things (IoT). Int J Comput Appl (IJCA) 111(7)Google Scholar
  5. 5.
    Kouicem DE, Bouabdallah A, Lakhlef H (2018) Internet of things security: a top-down survey. Comput Netw 141:199–221CrossRefGoogle Scholar
  6. 6.
    Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for internet of things. J Netw Comput Appl 42:120–134CrossRefGoogle Scholar
  7. 7.
    Granjal J, Monteiro E, Silva JS (2015) Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun Surv Tutor 17(3):1294–1312CrossRefGoogle Scholar
  8. 8.
    Daubert J, Wiesmaier A, Kikirasa P (2015) A view on privacy & trust in IoT. In: IEEE International Conference on Communication (ICC), London, UKGoogle Scholar
  9. 9.
    Suryani V, Selo, Widyawan (2016) A survey on trust in internet of things. In: 8th International Conference on Informational Technology and Electrical Engineering (ICITEE), Yogyakarta, IndonesiaGoogle Scholar
  10. 10.
    Yao X, Chen Z, Tian Y (2015) A lightweight attribute-based encryption scheme for the internet of things. Futur Gener Comput Syst 49:104–112CrossRefGoogle Scholar
  11. 11.
    Anwar S, Kishore D (2016) IOT based smart home security system with alert and door access control using smart phone. Int J Eng Res Technol (IJERT) 5(S12). ISSN: 2278-0181Google Scholar
  12. 12.
    He D, Zeadally S (2015) An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography. IEEE Internet Things J 2:72–83CrossRefGoogle Scholar
  13. 13.
    Chatzigiannakis L, Vitaletti A, Pyrgelis A (2016) A privacy-preserving smart parking system using an IoT elliptic curve based security platform. Comput Commun 89–90:165–177CrossRefGoogle Scholar
  14. 14.
    Martínez VG, Encinas LH, Ávila CS (2010) A survey of the elliptic curve integrated encryption scheme. J. Comput Sci Eng 2Google Scholar
  15. 15.
    Forouzan BA (2007) Cryptography and network security. Tata McGraw-HillGoogle Scholar
  16. 16.
    Liu Z, Grobschadl J, Hu Z, Jarvinen K, Wang H, Verbauwhede I (2017) Elliptic curve cryptography with efficiently computable endomorphisms and its hardware implementations for the internet of things. IEEE Trans Comput 66(5)MathSciNetCrossRefGoogle Scholar
  17. 17.
    Chernyshev M, Baig Z, Bello O, Zeadally S (2018) Internet of things (IoT): research, simulators, and testbeds. IEEE Internet Things J 5:1637–1647CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Maulana Azad National Institute of TechnologyBhopalIndia

Personalised recommendations