Skip to main content

A New Efficient and Secure Architecture Model for Internet of Things

  • Conference paper
  • First Online:
International Conference on Innovative Computing and Communications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1059))

  • 844 Accesses

Abstract

Internet of Things (IoT) is considered as one of the latest intelligent communication technologies in the world. IoT has been growing in different architectural designs which contributes to the connection between heterogeneous IoT devices. Although, there are many different IoT architectures have been proposed, but they are still suffering from many challenges such as standardization, security, and privacy. This paper will focus on reviewing some existing IoT architectures used to provide security and privacy for IoT networks. Moreover, this paper will introduce a novel IoT security architecture model named IoT-EAA. IoT-EAA tends to satisfy different requirements of IoT security. Hence, the novelty of the proposed IoT-EAA architecture model comes from an important layer called the security layer. This layer employs an external and internal security service against different attacks for each layer within the IoT-EAA architecture model. The proposed architecture model is compared to existing IoT architectures based on several criteria such as security, power and time consumption. Therefore, the proposed IoT-EAA increases security and decrease the power and time consumption, which consider an important contribution to improving the performance of IoT architecture.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Farooq MU, Waseem M, Khairi A, Mazhar S (2015) A critical analysis on the security concerns of internet of things (IoT). Int J Comput Appl 111(7)

    Google Scholar 

  2. Soumyalatha SGH (2016, May) Study of IoT: understanding IoT architecture, applications, issues and challenges. In: 1st International conference on innovations in computing & networking (ICICN16), CSE, RRCE. Int J Adv Netw Appl

    Google Scholar 

  3. Rani P, Sri Lakshmi G (2017) IoT vulnerabilities and security. Int J 2:6

    Google Scholar 

  4. Aldosari HM (2015) A proposed security layer for the Internet of things communication reference model. Procedia Comput Sci 65:95–98

    Article  Google Scholar 

  5. Bassi A, Bauer M, Fiedler M, Kranenburg RV (2013) Enabling things to talk. Springer-Verlag GmbH

    Google Scholar 

  6. Liu X, Zhao M, Li S, Zhang F, Trappe W (2017) A security framework for the internet of things in the future internet architecture. Future Internet 9(3):27

    Article  Google Scholar 

  7. Kamel SOM, Hegazi NH (2018) A proposed model of IoT security management system based on a study of internet of things (IoT) security. Int J Sci Eng Res 9(9):1227 ISSN 2229-5518

    Google Scholar 

  8. Alhamedi AH, Snasel V, Aldosari HM, Abraham A (2014, July) Internet of things communication reference model. In: 2014 6th International conference on computational aspects of social networks (CASoN). IEEE, pp 61–66

    Google Scholar 

  9. Zhang Y (2011, September) Technology framework of the internet of things and its application. In 2011 International conference on electrical and control engineering. IEEE, pp 4109–4112

    Google Scholar 

  10. Fremantle P (2014) A reference architecture for the internet of things. WSO2 White paper

    Google Scholar 

  11. Kim JT (2015) Requirement of security for IoT application based on gateway system. Communications 9(10):201–208

    Article  Google Scholar 

  12. Burmester M, De Medeiros B (2007, April) RFID security: attacks, countermeasures and challenges. In: The 5th RFID academic convocation, the RFID journal conference

    Google Scholar 

  13. Mitrokotsa A, Rieback MR, Tanenbaum AS (2010) Classification of RFID attacks. Gen 15693:14443

    Google Scholar 

  14. Li L (2012, May) Study on security architecture in the Internet of Things. In: Proceedings of 2012 international conference on measurement, information and control, vol 1. IEEE, pp 374–377

    Google Scholar 

  15. Douceur JR (2002, March) The sybil attack. In: International workshop on peer-to-peer systems. Springer, Berlin, Heidelberg, pp 251–260

    Chapter  Google Scholar 

  16. Ahmed N, Kanhere SS, Jha S (2005) The holes problem in wireless sensor networks: a survey. ACM SIGMOBILE. Mobile Computing and Communications Review 9(2): 4–18

    Article  Google Scholar 

  17. Bhattasali T, Chaki R, Sanyal S (2012) Sleep deprivation attack detection in wireless sensor network. arXiv preprint arXiv:1203.0231

  18. Padmavathi DG, Shanmugapriya M (2009) A survey of attacks, security mechanisms and challenges in wireless sensor networks. arXiv preprint arXiv:0909.0576

  19. Fulare PS, Chavhan N (2011) False data detection in wireless sensor network with secure communication. Int J Smart Sens Ad Hoc Netw (IJSSAN) 1(1):66–71

    Google Scholar 

  20. Farooq MU, Waseem M, Khairi A, Mazhar S (2015) A critical analysis on the security concerns of internet of things (IoT). Int J Comput Appl 111(7)

    Google Scholar 

  21. Padhy RP, Patra MR, Satapathy SC (2011) Cloud computing: security issues and research challenges. Int J Comput Sci Inf Technol Secur (IJCSITS) 1.2:136–146

    Google Scholar 

  22. Thakur BS, Chaudhary S (2013) Content sniffing attack detection in client and server side: a survey. Int J Adv Comput Res 3(2):7

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ahmed A. Elngar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Elngar, A.A., Elsayed, E.K., Ibrahim, A.A. (2020). A New Efficient and Secure Architecture Model for Internet of Things. In: Khanna, A., Gupta, D., Bhattacharyya, S., Snasel, V., Platos, J., Hassanien, A. (eds) International Conference on Innovative Computing and Communications. Advances in Intelligent Systems and Computing, vol 1059. Springer, Singapore. https://doi.org/10.1007/978-981-15-0324-5_35

Download citation

Publish with us

Policies and ethics