Zhi-Kai Zhang et al.  discussed ongoing research on internet of things such as authentication and authorization of IoT, privacy in IoT, malware in IoT etc. and mainly focused on security issues in IoT. The major security issues namely object identification issue in IoT to ensure the integrity of the records; authentication and authorization to certify the user to use the IoT objects were highlighted. The need to preserve the privacy of collected data through data anonymization was stressed. Lightweight cryptosystems and malwares in IoT were also explored. DU Jiang et al.  offered three ways to analyze the existing information security of Internet of things M2M. Possible security threats in M2M's structure, which consists of front-end sensors and equipment, networks, back-end IT systems were explored. Eight major standards such as access control, privacy protection, user authentication, no arrived patience, data confidentiality, communication layer security, data integrity, and availability at any time needed to ensure security in IoT systems were described. The privacy and credibility (data integrity and confidentiality) issues of the internet of things system were examined. Subho Shankar Basu et al.  discussed security issues and design challenges such as heterogeneity, connectivity, mobility, addressing and identification, spatio-temporal services, resource constraints, data
[Vijayalakshmi*, 3(11): November, 2016] ISSN 2349-6193 Impact Factor: 2.805 IJESMR I nternational J ournal OF E ngineering S ciences & M anagement R esearch http: // © International Journal of Engineering Sciences & Management Research  interchange, resource and service discovery related to IoT applications. The threats such as spoofing, tampering, repudiation, information leakage, DoS, user privacy and replay attacks were also described. An effective security framework was proposed to prevent threats. Glenn A.Fink et al.  discussed various kinds of vulnerabilities in IoT and also societal effects of IoT such as standards and privacy and security. Discussion on the security system related to crime, cyber welfare, emergent behavior, scientific and technology challenges, social and regulatory challenges etc. was made. Various kinds of vulnerabilities were discussed and techniques to mitigate such vulnerabilities were provided. Sye Loong Keoh et al.  focused on communication security for IoT, specifically the standard security protocols. Four modes namely NoSec, PreShared Key, Raw Public Key and Certificate based on the configuration of IoT device were described. Deployment of DTLS which is considered as the main security suite for IoT was done to provide security functionalities to the IoT devices. Table 2: Issues and Challenges in Internet of Things AUTHOR DESCRIPTION ISSUES AND CHALLENGES Hui Suo et al.  Discussed Security in each layer: 1.Perception 2. Network 3. Support 4. Application 1. Power and storage 2. DDoS attack 3. Authentication and confidentiality 4. Privacy Protection Chen Qiang et al.  Discussed 1. RFID Tag information security 2. Wireless communication and
You've reached the end of your free preview.
Want to read all 10 pages?
- Fall '19