Study to Improve Security for IoT Smart Device Controller: Drawbacks and Countermeasures

Author:

Su Xin1ORCID,Wang Ziyu2,Liu Xiaofeng1,Choi Chang3ORCID,Choi Dongmin4ORCID

Affiliation:

1. College of IOT Engineering, Changzhou Key Laboratory of Robotics and Intelligent Technology, Hohai University, Changzhou 213022, China

2. Nanjing Ivtime, Co., Ltd., Nanjing 210000, China

3. Department of Computer Engineering and IT Research Institute, Chosun University, Gwangju 61452, Republic of Korea

4. Division of Undeclared Majors, Chosun University, Gwangju 61452, Republic of Korea

Abstract

Including mobile environment, conventional security mechanisms have been adapted to satisfy the needs of users. However, the device environment-IoT-based number of connected devices is quite different to the previous traditional desktop PC- or mobile-based environment. Based on the IoT, different kinds of smart and mobile devices are fully connected automatically via device controller, such as smartphone. Therefore, controller must be secure compared to conventional security mechanism. According to the existing security threats, these are quite different from the previous ones. Thus, the countermeasures applied should be changed. However, the smart device-based authentication techniques that have been proposed to date are not adequate in terms of usability and security. From the viewpoint of usability, the environment is based on mobility, and thus devices are designed and developed to enhance their owners’ efficiency. Thus, in all applications, there is a need to consider usability, even when the application is a security mechanism. Typically, mobility is emphasized over security. However, considering that the major characteristic of a device controller is deeply related to its owner’s private information, a security technique that is robust to all kinds of attacks is mandatory. In this paper, we focus on security. First, in terms of security achievement, we investigate and categorize conventional attacks and emerging issues and then analyze conventional and existing countermeasures, respectively. Finally, as countermeasure concepts, we propose several representative methods.

Funder

Natural Science Foundation of Jiangsu Province

Publisher

Hindawi Limited

Subject

Computer Networks and Communications,Information Systems

Cited by 9 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. IMPROVING SECURITY OF IOT DEVICE COMMUNICATION USING MODIFIED HASHING SOLUTION;ShodhKosh: Journal of Visual and Performing Arts;2024-05-31

2. IMPLEMENTING TOKEN-BASED AUTHENTICATION AND MODIFIED HASHING FOR IOT SECURITY;ShodhKosh: Journal of Visual and Performing Arts;2024-01-31

3. Security in Internet of Things: A Review;IEEE Access;2022

4. Sensor technology for environmental monitoring of shrimp farming;JOURNAL OF SENSOR SCIENCE AND TECHNOLOGY;2021-05-31

5. Assessing Security of Software Components for Internet of Things: A Systematic Review and Future Directions;Security and Communication Networks;2021-02-15

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3