Security in Internet of Things: Requirements, Challenges, and Open Issues

Security in Internet of Things: Requirements, Challenges, and Open Issues

Said Ul Abrar, Kamran Ullah, Saleem Zahid, Mohib Ullah, Irfan Ullah Khan, Muhammad Inam Ul Haq
Copyright: © 2023 |Pages: 19
ISBN13: 9781668469149|ISBN10: 1668469146|ISBN13 Softcover: 9781668469156|EISBN13: 9781668469163
DOI: 10.4018/978-1-6684-6914-9.ch011
Cite Chapter Cite Chapter

MLA

Abrar, Said Ul, et al. "Security in Internet of Things: Requirements, Challenges, and Open Issues." Protecting User Privacy in Web Search Utilization, edited by Rafi Ullah Khan, IGI Global, 2023, pp. 215-233. https://doi.org/10.4018/978-1-6684-6914-9.ch011

APA

Abrar, S. U., Ullah, K., Zahid, S., Ullah, M., Khan, I. U., & Haq, M. I. (2023). Security in Internet of Things: Requirements, Challenges, and Open Issues. In R. Khan (Ed.), Protecting User Privacy in Web Search Utilization (pp. 215-233). IGI Global. https://doi.org/10.4018/978-1-6684-6914-9.ch011

Chicago

Abrar, Said Ul, et al. "Security in Internet of Things: Requirements, Challenges, and Open Issues." In Protecting User Privacy in Web Search Utilization, edited by Rafi Ullah Khan, 215-233. Hershey, PA: IGI Global, 2023. https://doi.org/10.4018/978-1-6684-6914-9.ch011

Export Reference

Mendeley
Favorite

Abstract

Recently, electronics devices, cognitive computing, and sensing enable the deployment of internet-of-things (IoTs) with a huge application domain. However, resource constraints such as low computing powers or limited storage leave IoTs infrastructures vulnerable to a variety of cyber-attacks. In dark-net the address space developed as designated unrestricted internet address space anticipated to be used by trustworthy hosts anywhere in the world, therefore, any communication activity is presumed to be unwanted and particularly treated as a probe, backscatter, or miss-configuration. This chapter investigates and evaluates the operation of dark-net traffic detection systems in IoTs networks. Moreover, the most recent work done to ensure security in the IoTs network has been discussed. In particular, the areas of privacy provisioning, lightweight cryptographic framework, secure routing, robustness, and DoS attacks have been addressed. Moreover, based on the analysis of existing state-of-the-art protocols, the security requirements and challenges are highlighted along with identified open issues.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.