IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Security in Internet of Things: Requirements, Challenges, and Open Issues

Security in Internet of Things: Requirements, Challenges, and Open Issues
View Sample PDF
Author(s): Said Ul Abrar (The University of Agriculture, Peshawar, Pakistan), Kamran Ullah (The University of Agriculture, Peshawar, Pakistan), Saleem Zahid (The University of Agriculture, Peshawar, Pakistan), Mohib Ullah (The University of Agriculture, Peshawar, Pakistan), Irfan Ullah Khan (Imam Abdulrahman Bin Faisal University, Dammam, Saudi Arabia)and Muhammad Inam Ul Haq (Khushal Khan Khattak University, Karak, Pakistan)
Copyright: 2023
Pages: 19
Source title: Protecting User Privacy in Web Search Utilization
Source Author(s)/Editor(s): Rafi Ullah Khan (The University of Agriculture, Peshawar, Pakistan)
DOI: 10.4018/978-1-6684-6914-9.ch011

Purchase

View Security in Internet of Things: Requirements, Challenges, and Open Issues on the publisher's website for pricing and purchasing information.

Abstract

Recently, electronics devices, cognitive computing, and sensing enable the deployment of internet-of-things (IoTs) with a huge application domain. However, resource constraints such as low computing powers or limited storage leave IoTs infrastructures vulnerable to a variety of cyber-attacks. In dark-net the address space developed as designated unrestricted internet address space anticipated to be used by trustworthy hosts anywhere in the world, therefore, any communication activity is presumed to be unwanted and particularly treated as a probe, backscatter, or miss-configuration. This chapter investigates and evaluates the operation of dark-net traffic detection systems in IoTs networks. Moreover, the most recent work done to ensure security in the IoTs network has been discussed. In particular, the areas of privacy provisioning, lightweight cryptographic framework, secure routing, robustness, and DoS attacks have been addressed. Moreover, based on the analysis of existing state-of-the-art protocols, the security requirements and challenges are highlighted along with identified open issues.

Related Content

Mohib Ullah, Arbab Waseem Abbas, Lala Rukh, Kamran Ullah, Muhammad Inam Ul Haq. © 2023. 25 pages.
Rafi Ullah Khan, Mohib Ullah, Bushra Shafi, Imran Ihsan. © 2023. 20 pages.
Rafi Ullah Khan, Mohib Ullah, Bushra Shafi. © 2023. 17 pages.
Shaukat Ali, Shah Khusro, Mumtaz Khan. © 2023. 34 pages.
Tayyaba Riaz, Iftikhar Alam. © 2023. 20 pages.
Ufuk Uçak, Gurkan Tuna. © 2023. 22 pages.
Muhammad Hamad, Altaf Hussain, Majida Khan Tareen. © 2023. 21 pages.
Body Bottom