Skip to main content

Security Protocols for IoT

  • Chapter
  • First Online:

Part of the book series: Studies in Big Data ((SBD,volume 47))

Abstract

The Internet of Things (IoT), is a network of devices that are uniquely identified and has embedded software required to communicate the transient states and data that are usually used to trigger an actuator. The edge networking devices and protocols are used to communicate with a cloud server that processes and aggregates the big data arriving from various devices, performs analytics and aids in business decisions. IoT has become an integral part of today’s industrial, agriculture, healthcare and smart city revolution. Securing all entities involved in an IoT network is vital as it involves pervasive data collection and dissemination. Current IoT protocols work with IP protocols as backbone, but they are specially designed to operate in multiple layers and provide security at various layers. This chapter focuses on IoT protocols that deals with securing an IoT network. The major challenges in securing an IoT network is lack of standardization at manufacturing level which exposes the hardware, software and the data to various threats and attacks. The IoT protocols have to deal with security breaches at the site of the cloud service provider and the security issues pertaining to data privacy, authentication, authorization and trust management in a distributed heterogeneous environment. This chapter also elaborates on various security attacks and the solutions offered by IoT protocols.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Shipley AJ (2013) Security in the internet of things, lessons from the past for the connected future. Security Solutions, Wind River, White Paper

    Google Scholar 

  2. Jing Q, Vasilakos AV, Wan J, Lu J, Qiu D (2014) Security of the internet of things: perspectives and challenges. Wireless Netw 20(8):2481–2501

    Article  Google Scholar 

  3. Roman R, Zhou J, Lopez J (2013) On the features and challenges of security and privacy in distributed internet of things. Comput Netw 57(10):2266–2279

    Article  Google Scholar 

  4. Veracode white paper—The internet of things: security research study. https://www.veracode.com/sites/default/files/Resources/Whitepapers/internet-of-things-whitepaper.pdf/

  5. Hajdarbegovic N (2017) Are we creating an insecure IoT? Secure challenges and concerns. https://www.toptal.com/it/are-we-creating-an-insecure-internet-of-things

  6. Lewis N (2015) Prevent IoT security threats and attacks before its too late. http://internetofthingsagenda.techtarget.com/tip/Prevent-IoT-security-threats-and-attacks-before-its-too-late

  7. Absolute security. https://www.absolutesecurity.co.uk/

  8. Prevent enterprise IoT security challenges with preparation. http://internetofthingsagenda.techtarget.com/essentialguide/Prevent-enterprise-IoT-security-challenges-with-preparation

  9. Johnson S (2017) Using mesh networking to interconnect IoT devices. http://internetofthingsagenda.techtarget.com/feature/Using-mesh-networking-to-interconnect-IoT-devices

  10. Wheeler C (2017) Three new attack vectors that will be born out of IoT. https://www.liquidweb.com/blog/three-new-attack-vectors-will-born-iot/ [Three new attack vectors]

  11. Higginis KJ (2017) IoT devices plagued by lesser known security hole. https://www.darkreading.com/cloud/iot-devices-plagued-by-lesser-known-security-hole-/d/d-id/1329320

  12. Mah P (2008) New attack vectors challenge IT security pros. http://www.techrepublic.com/blog/it-security/new-attack-vectors-challenge-it-security-pros/

  13. IoT standards and protocols. https://www.postscapes.com/internet-of-things-protocols/

  14. Manoharan V (2016) TCP/IP layer-wise IoT protocols. http://www.synapt-iot.com/blog/tcpip-layer-wise-iot-protocols/

  15. LPWAN Technology Decisions: 17 Critical Features, Weightless STG (2016) http://www.weightless.org/membership/hvVs4ZGQqr5dwCDlBiYX

  16. Protocol, W. Name: Azamuddin Rotation Project Title: Survey on IoT security. Chicago [Survey on IoT security]

    Google Scholar 

  17. Hossain MM, Fotouhi M, Hasan R (2015) Towards an analysis of security issues, challenges, and open problems in the internet of things. In: 2015 IEEE World Congress on Services (SERVICES). IEEE, pp 21–28

    Google Scholar 

  18. http://www.darkreading.com/iot/5-tips-for-protecting-firmware-from-attacks/d/d-id/1325604

  19. http://safewayconsultoria.com/wp-content/uploads/2016/05/Beware-of-older-cyber-attacks_2016-1.pdf

  20. https://www.welivesecurity.com/2016/10/24/10-things-know-october-21-iot-ddos-attacks/

  21. https://www.enisa.europa.eu/publications/info-notes/major-ddos-attacks-involving-iot-devices

  22. http://krebsonsecurity.com/

  23. www.symtrex.com/category/iot

  24. Sutaria R, Govindachari R (2013) Making sense of interoperability: protocols and standardization initiatives in IOT. In: 2nd International Workshop on Computing and Networking for Internet of Things

    Google Scholar 

  25. NetworkWolves (2015) https://networkwolves.wordpress.com/2015/03/20/tcp-and-udp-and-difference-between-them/

  26. MQTT basics in IoT. http://www.rfwireless-world.com/Terminology/MQTT-protocol.html

  27. Singh M, Rajan MA, Shivraj VL, Balamuralidhar P (2015) Secure mqtt for internet of things (iot). In: 2015 fifth international conference on Communication Systems and Network Technologies (CSNT). IEEE, pp 746–751

    Google Scholar 

  28. Connected Consumer Product Best Practice Guidelines (2016) IoT security Foundation. https://iotsecurityfoundation.org/wp-content/uploads/2016/12/Connected-Consumer-Products.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to H. Parveen Sultana .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Cynthia, J., Parveen Sultana, H., Saroja, M.N., Senthil, J. (2019). Security Protocols for IoT. In: Jeyanthi, N., Abraham, A., Mcheick, H. (eds) Ubiquitous Computing and Computing Security of IoT. Studies in Big Data, vol 47. Springer, Cham. https://doi.org/10.1007/978-3-030-01566-4_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-01566-4_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-01565-7

  • Online ISBN: 978-3-030-01566-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics