Abstract
A lot of communication are developed and advanced with different and heterogeneous communication techniques by integration of wireless and wire connection. Conventional technology is mainly focus on information technology based on computer techniques in the field of industry, manufacture and automation fields. It consists of individual skill and technique. As new technologies are developed and enhanced with conventional techniques, a lot of new application is emerged and merged with previous mechanism and skills. The representative application is internet of things services and applications. Internet of things is breakthrough technologies and one of the innovation industries which are called 4 generation industry revolution. Many different types of object and devices are embedded in sensor node. They are inter-connected with optimized open system interconnection protocol over internet, wireless and wire medium. Most of communication is fully inter-connected with conventional techniques at point to point and end to application in general. Most of information in internet of things is weak against attack. This may induce vulnerable features to unauthorized and outside attacker over internet protocol, Bluetooth, Wi-Fi, and so forth. As high and low efficient equipment are merged into heterogeneous infrastructure, IoT communication surroundings has become more complex, Due to limited resources in IoT such as small memory, low power and computing power, IoT devices are vulnerable and disclosed with security problems. In this chapter, we analyzed security challenges and threats based on smart home network under IoT service.
Reference49 articles.
1. Brahim Ethem Bagci, Shahid Raza and Tony Chung, Combined Secure Storage an Communication for the Internet of Things, In Proceedings of the 2013 IEEE International Conference on Sensing, Communications and Networking, 2013, pp. 523-531
2. Freddy K Santoso and Nicholas C H Vun, Securing IoT for Smart Home System, In Proceedings of the 2015 IEEE International Symposium on Consumer Electronics, 2015, pp. 1-2
3. Raja Benabdessalem, Mohamed Hamdi and Tai-Hoon Kim, A Survey on Security Models, Techniques and Tools for the Internet of Things, In Proceedings of the 2014 7th International Conference on Advanced Software Engineering & Its Application, 2014, pp. 44-48
4. Y. W. Lim, S.B. Daas, S. J. Hashim, R. M. Sidek, N. A. Kamsani and F. Z. Rokhani, Reduced Hardware Architecture for Energy Efficient IoT Healthcare Sensor Nodes, In Proceedings of the 2015 IEEE International Circuits and Systems Symposium, 2015, pp. 90-95
5. Christof Paar and Andre Weimerskirch, Embedded Security in a Pervasive World, Information Security Technical Report, Elsevier, Vol 12, Issue 3, 2007, pp.155-161