Skip to main content

Universal Layers of IoT Architecture and Its Security Analysis

  • Conference paper
  • First Online:
New Paradigm in Decision Science and Management

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1005))

Abstract

Internet of Things (IoT)-based intelligent devices have been actively used in clouds to provide various data ranging from personal healthcare to disaster response. High acceptance rate of IoT devices resulting day-by-day increment in the number of Internet’s connected devices. The enormous growth of IoT devices and their reliability on wireless technologies make it vulnerable to cyberattacks which posing challenges for digital forensic experts. Security concern such as secure communication, access control, secure storage of information and privacy is major concern in IoT surroundings. The rapid growth of IoT services and devices resulted in the deployment of various insecure and vulnerable system. Furthermore, every single device including sensors that deployed in IoT network and each byte that is transmitted within the IoT network may come under scrutiny at some layer. This chapter identifies universal layers within the IoT architecture and discussed security vulnerability in all layers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ashton, K.: In the Real World, Things Matter more than Ideas. That ‘Internet of Things’ Thing (2009)

    Google Scholar 

  2. Lee, U., et al.: Intelligent positive computing with mobile, wearable, and IoT devices: literature review and research directions. Ad Hoc Netw. 83, 8–24 (2019)

    Article  Google Scholar 

  3. Mohiuddin, I., Almogren, A.: Workload aware VM consolidation method in edge/cloud computing for IoT applications. J. Parallel Distrib. Comput. 123, 204–214 (2019)

    Article  Google Scholar 

  4. Alam, M.G.R., Hassan, M.M., Zi, M., Uddin, A.Almogren, Fortino, G.: Autonomic computation offloading in mobile edge for IoT applications. Futur. Gener. Comput. Syst. 90, 149–157 (2019)

    Article  Google Scholar 

  5. Sun, X., Ansari, N.: Dynamic resource caching in the IoT application layer for smart cities. IEEE Internet Things J. 5(2), 606–613 (2018)

    Article  Google Scholar 

  6. Karatas, F., Korpeoglu, I.: Fog-based data distribution service (F-DAD) for internet of things (IoT) applications. Futur. Gener. Comput. Syst. 93, 156–169 (2019)

    Article  Google Scholar 

  7. Zhang, N., Mi, X., Feng, X., Wang, X., Tian, Y., Qian, F.: Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home (2018)

    Google Scholar 

  8. Bahishti, A.A.: Humanoid robots and human society. Adv. J. Soc. Sci. 1(1), 60–63 (2017)

    Article  Google Scholar 

  9. Yaqoob, I., Hashem, I.A.T., Ahmed, A., Kazmi, S.M.A., Hong, C.S.: Internet of things forensics: recent advances, taxonomy, requirements, and open challenges. Futur. Gener. Comput. Syst. 92, 265–275 (2019)

    Article  Google Scholar 

  10. Qian, Y., et al.: Towards decentralized IoT security enhancement: a blockchain approach. Comput. Electr. Eng. 72, 266–273 (2018)

    Article  Google Scholar 

  11. Beecher, P.: Enterprise-grade networks: the answer to IoT security challenges. Netw. Secur. 2018(7), 6–9 (2018)

    Article  Google Scholar 

  12. Sadique, K.M., Rahmani, R., Johannesson, P.: Towards security on internet of things: applications and challenges in technology. Procedia Comput. Sci. 141, 199–206 (2018)

    Article  Google Scholar 

  13. Riahi Sfar, A., Natalizio, E., Challal, Y., Chtourou, Z.: A roadmap for security challenges in the internet of things. Digit. Commun. Networks 4(2), 118–137 (2018)

    Article  Google Scholar 

  14. Sethi, P., Sarangi, S.R.: Internet of things: architectures, protocols, and applications. J. Electr. Comput. Eng. 2017, 1–25 (2017)

    Article  Google Scholar 

  15. Suo, H., Wan, J., Zou, C., Liu, J.: Security in the internet of things: a review. Int. Conf. Comput. Sci. Electr. Eng. 2012, 648–651 (2012)

    Google Scholar 

  16. Aziz, T., Haq, E.: Security challenges facing IoT layers and its protective measures. Int. J. Comput. Appl. 179(27), 31–35 (2018)

    Google Scholar 

  17. Chen, K., et al.: Internet-of-Things security and vulnerabilities: taxonomy, challenges, and practice. J. Hardw. Syst. Secur. 2(2), 97–110 (2018)

    Article  Google Scholar 

  18. Silva, B.N., Khan, M., Han, K.: Internet of things: a comprehensive review of enabling technologies, architecture, and challenges. IETE Tech. Rev. 35(2), 205–220 (2018)

    Article  Google Scholar 

  19. Mahmoud, R., Yousuf, T., Aloul, F., Zualkernan, I.: Internet of things (IoT) security: current status, challenges and prospective measures. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 336–341 (2015)

    Google Scholar 

  20. Li, L.: Study on security architecture in the internet of things. In: Proceedings of 2012 International Conference on Measurement, Information and Control, pp. 374–377 (2012)

    Google Scholar 

  21. Toshihiko, O.: Special Issue on IoT That Supports Digital Businesses Lightweight Cryptography Applicable to Various IoT Devices

    Google Scholar 

  22. Biryukov, A., Perrin, L.: State of the Art in Lightweight Symmetric Cryptography

    Google Scholar 

  23. Katagi, M., Moriai, S.: Lightweight Cryptography for the Internet of Things

    Google Scholar 

  24. Alaba, F.A., Othman, M., Hashem, I.A.T., Alotaibi, F.: Internet of things security: a survey. J. Netw. Comput. Appl. 88, 10–28 (2017)

    Article  Google Scholar 

  25. Leo, M., Battisti, F., Carli, M., Neri, A.: A federated architecture approach for Internet of Things security. In: 2014 Euro Med Telco Conference (EMTC), pp. 1–5 (2014)

    Google Scholar 

  26. Zhang, W., Qu, B.: Security Architecture of the Internet of Things Oriented to Perceptual Layer (2013)

    Google Scholar 

  27. Yaqoob, I., Hashem, I.A.T., Mehmood, Y., Gani, A., Mokhtar, S., Guizani, S.: Enabling communication technologies for smart cities. IEEE Commun. Mag. 55(1), 112–120 (2017)

    Article  Google Scholar 

  28. Naidu, G.A., Kumar, J., Garudachedu, V., Ramesh, P.R.: 6LoWPAN border router implementation for IoT devices on RaspberryPi. SSRN Electron. J. (2018)

    Google Scholar 

  29. Kavyashree, E.D.: 6LoWPAN network using Contiki operating system. In: NCICCNDA, pp. 300–310 (2018)

    Google Scholar 

  30. Farooq, M.U., Waseem, M., Khairi, A., Mazhar, S.: A critical analysis on the security concerns of internet of things (IoT). Int. J. Comput. Appl. 111(7), 1–6 (2015)

    Google Scholar 

  31. Stergiou, C., Psannis, K.E., Kim, B.-G., Gupta, B.: Secure integration of IoT and cloud computing. Futur. Gener. Comput. Syst. 78, 964–975 (2018)

    Article  Google Scholar 

  32. Bittencourt, L., et al.: The internet of things, fog and cloud continuum: integration and challenges. Internet of Things 3–4, 134–155 (2018)

    Article  Google Scholar 

  33. Mukherjee, B., et al.: Flexible IoT security middleware for end-to-end cloud–fog communication. Futur. Gener. Comput. Syst. 87, 688–703 (2018)

    Article  Google Scholar 

  34. Yildirim, H., Ali-Eldin, A.M.T.: A model for predicting user intention to use wearable IoT devices at the workplace. J. King Saud Univ. Comput. Inf. Sci. (2018)

    Google Scholar 

  35. Jing, Q., Vasilakos, A.V., Wan, J., Lu, J., Qiu, D.: Security of the internet of things: perspectives and challenges. Wirel. Netw. 20(8), 2481–2501 (2014)

    Article  Google Scholar 

  36. Valmohammadi, C.: Examining the perception of Iranian organizations on internet of things solutions and applications. Ind. Commer. Train. 48(2), 104–108 (2016)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amir Abdullah .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Abdullah, A., Kaur, H., Biswas, R. (2020). Universal Layers of IoT Architecture and Its Security Analysis. In: Patnaik, S., Ip, A., Tavana, M., Jain, V. (eds) New Paradigm in Decision Science and Management. Advances in Intelligent Systems and Computing, vol 1005. Springer, Singapore. https://doi.org/10.1007/978-981-13-9330-3_30

Download citation

Publish with us

Policies and ethics