Volume 16, Issue 2 (4-2024)                   itrc 2024, 16(2): 17-24 | Back to browse issues page


XML Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Zoljalali Moghaddam S A, Vafadoost P. An Overview of Secure Communications for the Internet of Things. itrc 2024; 16 (2) :17-24
URL: http://journal.itrc.ac.ir/article-1-644-en.html
1- Electrical Engineering Department Electrical and Computer Faculty Tarbiat Modares University Tehran, Iran , ali2451377@gmail.com
2- Biomedical Engineering Department Electrical and Computer Faculty Hakim Sabzevari University Sabzevar, Iran.
Abstract:   (1241 Views)
As an emerging technology that combines both digital and physical realms, access to information technology has expanded (IoT) the Internet of Things. The Internet of Things, as it becomes more pervasive, will overshadow human life as much as possible. Some of the major challenges associated with the development of this phenomenon have been the issue of security, which is needed in all its layers and even specifically in individual layers. According to the structure and applications of the Internet of Things, as well as the threats and challenges in cyberspace, we first examine security needs and then, by examining some methods of securing the Internet of Things, we propose a method according to the approaches discussed. 
Full-Text [PDF 758 kb]   (408 Downloads)    
Type of Study: Research | Subject: Network

References
1. G. Eason, B. Noble, and I. N. Sneddon, “On certain integrals of Lipschitz-Hankel type involving products of Bessel functions,” Phil. Trans. Roy. Soc. London, vol. A247, pp. 529–551, April 1955. (references)
2. J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68–73.
3. I. S. Jacobs and C. P. Bean, “Fine particles, thin films and exchange anisotropy,” in Magnetism, vol. III, G. T. Rado and H. Suhl, Eds. New York: Academic, 1963, pp. 271–350.
4. Lombardi, Marco, Francesco Pascale, and Domenico Santaniello. "Internet of things: A general overview between architectures, protocols and applications." Information 12, no. 2 (2021): 87.
5. Dunkels A, Grönvall B, Voigt T. Contiki—a lightweight and flexible operating system for tiny networked sensors. In Proceedings of 1st IEEE Workshop on Embedded Networked Sensors (EmNetS’04), Tampa, USA, 2004
6. Liu A, Ning P. TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks. In Proceedings of 7th International Conference on Information Processing in Sensor Networks (IPSN’08), Washington, DC, USA, 2008.
7. Szczechowiak P, Oliveira L, Scott M, Collier M, Dahab R. NanoECC: testing the limits of elliptic curve cryptography in sensor networks. In Proceedings of 5th European Conference on Wireless Sensor Networks (EWSN’08), Bologna, Italy, 2008.
8. Liu D, Ning P. Establishing pairwise keys in distributed sensor networks. In Proceedings of 10th ACM Conference on Computer and Communications Security (CCS), New York, NY, USA, 2003.
9. Chung A, Roedig U. DHB-KEY: an efficient key distribution scheme for wireless sensor networks. In Proceedings of 4th IEEE International Workshop on Wireless and Sensor Networks Security (WSNS’08), Atlanta, USA, 2008.
10. Arch Rocks Adds Ruggedized Version Of IP-Based ‘PhyNet’ Wireless Sensor Network for Harsh Outdoor Enivorments, With PhyNet N4X, Protected Devices Monitor Air Quality, Traffic, Toxics, Solar Power, Crop Health and More; Users Analyze the Data Remotely,2008
11. Roman R, Alcaraz C, Lopez J, Sklavos N. Key management systems for sensor networks in the context of the Internet of Things. Computers and Electrical Engineering 2011; 37(2): 147–159.
12. Oppliger, Rolf. SSL and TLS: Theory and Practice. Artech House, 2023.
13. Hong S, Kim D, Ha M, et al. SNAIL: an IP-based wireless sensor network approach to the Internet of Things. Wireless Communications, IEEE 2010; 17(6): 34–42.
14. Shahid Raza, Simon Duquennoy, Joel Höglund,Utz Roedig and Thiemo Voigt: Secure communication for the Internet of Things— a comparison of link-layer security and IPsec for 6LoWPAN, Networks 2014; 7:2654–2668 .
15. Rachit, Shobha Bhatt, and Prakash Rao Ragiri. "Security trends in Internet of Things: A survey." SN Applied Sciences 3 (2021): 1-14.
16. D.Geneiatakis, I.Kounelis, R.Neisse , I.Nai-Fovino ” Security and Privacy Issues for an IoT based Smart Home” 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) , Pages: 1292 - 1297 IEEE Conference Publications.
17. Hamdan, Salam, Moussa Ayyash, and Sufyan Almajali. "Edgecomputing architectures for internet of things applications: A survey." Sensors 20, no. 22 (2020): 6441.
18. Nick Heudecker. DBMS Characteristics for the Internet of Things. 2015. gartner.com
19. Scott Matteson. How to secure your IoT devices from botnets and other threats. 2017.techrepublic.com.
20. Anthi, Eirini, Lowri Williams, Małgorzata Słowińska, George Theodorakopoulos, and Pete Burnap. "A supervised intrusion detection system for smart home IoT devices." IEEE Internet of Things Journal 6, no. 5 (2019): 9042-9053.
21. Jin, Wenquan, and Dohyeun Kim. "Resource management based on OCF for device self-registration and status detection in IoT networks." Electronics 8, no. 3 (2019): 311.

Add your comments about this article : Your username or Email:
CAPTCHA

Send email to the article author


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.