Affiliation:
1. National Institute of Technology, India
Abstract
Internet of Things (IoT) offers the capability to connect and integrate both digital and physical objects to the internet and to enable machine-to-machine and machine-to-human communication or interactions services. The real-time adoptions and deployments of such systems for different applications such as smart cities, smart grids, smart homes, or smart environments require guaranteed security and privacy-enabled IoT services. This is due to fact that devices in the IoT generate, process, and exchange huge amounts of safety-critical data as well as privacy-sensitive information. In order to ensure secure and safe operation and to avoid cyber-attacks on such systems, it is crucial to incorporate security and privacy measures to countermeasure the different possible attacks. This chapter presents different security and privacy requirements and a taxonomy of security threats in the context of the IoT. In addition, the authors survey the most relevant defense strategies available in the literature related to IoT security with their merits and demerits.
Reference58 articles.
1. Lightweight Sybil Attack Detection in MANETs
2. Autonomic schemes for threat mitigation in Internet of Things
3. Bao, F., & Chen, I. (2012). Dynamic trust management for internet of things applications. Proceedings of the 2012 International Workshop on Self-Aware Internet of Things, Self-IoT ’12, 1–6.
4. CASTLE: Continuously Anonymizing Data Streams
5. Choi, B. G., Cho, E. J., Kim, J. H., Hong, C. S., & Kim, J. H. (2009). A sinkhole attack detection mechanism for LQI based mesh routing in WSN. In International conference on information networking, ICOIN-2009. Chiang Mai, Thailand: Institute of Electrical and Electronics Engineers.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献