Abstract
A large amount of data that IoT applications deal, is users’ Private data, and their privacy is a significant issue. However, if users are not sure about the security of their data, they will not desire to use such applications. The goal of this study is to improve the security and privacy of users in the Internet of Things (IoTs) setting. Since, the application of IoT technology is growing day by day. Also, the importance of users’ data security is always top of the list and difficult to achieve. In this study, we studied latest development in the security of Internet of Things (IoTs) so that we can use it to investigate its challenges and advantages.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zhang, Y., Wen, J.: An IoT electric business model based on the protocol of bitcoin. In: 2015 18th International Conference on Intelligence in Next Generation Networks (ICIN), pp. 184–191. IEEE (2015)
Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): A vision, architectural elements, and future directions. Futur. Gener. Comput. Syst. 29(7), 1645–1660 (2013)
Khoo, B.: RFID - from tracking to the Internet of Things: a review of developments. In: Proceedings of the IEEE/ACM International Conference on Green Computing and Communications & International Conference on Cyber, Physical and Social Computing (2010)
SY, P.: Defending Privacy e Dark Side of IoT. Automating Crypt. (2015)
Jing, Q., Vasilakos, A.V., Wan, J., et al.: Security of the internet of things: perspectives and challenges. Wireless Netw. 20(8), 2481–2501 (2014)
Weis, S., Sarma, S., Rivest, R., Engels, D.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-39881-3_18
Kavun, E., Yalcin, T.: A lightweight implementation of keccak hash function for radio-frequency identification applications. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 258–269. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-16822-2_20
Zhang, Y., Shen, Y., Wang, H., et al.: On secure wireless communications for IoT under eavesdropper collusion. IEEE Trans. Autom. Sci. Eng. 13(3), 1281–1293 (2015)
Massis, B.: The internet of things and its impact on the library. New Libr. World 117(3/4), 289–292 (2016)
Liu, Y., Cheng, C., Gu, T., et al.: A lightweight authenticated communications scheme for a smart grid. IEEE Trans. Smart Grid 7(3), 1304–1313 (2016)
Kumar, T., Porambage, P., Ahmad, I.: Securing gadget-free digital services. Computer 51(11), 66–77 (2018)
Alaba, F., Othman, M., Hashem, I., Alotaibi, F.: Internet of things security: a survey. J. Netw. Comput. Appl. 88, 10–28 (2017)
Jurcut, A.D., Liyanage, M., Chen, J., et al.: On the security verification of a short message service protocol. Presented at the 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain (2018)
Horrow, S., Anjali, S.: Identity management framework for cloud based internet of things. In: Proceedings of the First International Conference on Security of Internet of Things, SecurIT 2012, pp. 17–19. ACM, Kollam (2012)
Lin, X., Sun, X., Wang, X., et al.: TSVC: timed efficient and secure vehicular communications with privacy preserving. IEEE Trans. Wireless Commun. 7(12), 4987–4998 (2008)
Lin, X., Li, X.: Achieving efficient cooperative message authentication in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 62(7), 3339–3348 (2013)
Zhou, J., Dong, X., Cao, Z., et al.: 4S: a secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Inf. Sci. 314, 255–276 (2015)
Sen, J.: Privacy preservation technologies in internet of things. In: Proceedings of International Conference on Emerging Trends in Mathematics, Technology, and Management, pp. 18–20 (2011)
Zhou, J., Dong, X., Cao, Z., et al.: Secure and privacy preserving protocol for cloud-based vehicular DTNs. IEEE Trans. Inf. Forensics Secur. 10(6), 1299–1314 (2015)
Roman, R., Alcaraz, C., Lopez, S.N.: Key management systems for sensor networks in the context of the internet of things. Comput. Electr. Eng. 37 (2), 147–159 (2011)
Zhou, J., Cao, Z., Dong, X., et al.: TR-MABE: white-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-heathcare cloud computing systems. IEEE INFOCOM (2015)
Lu, R., Lin, X., Zhu, H., et al.: Pi: a practical incentive protocol for delay tolerant networks. IEEE Trans. Wireless Commun. 9(4), 1483–1492 (2010)
Paillier, P.: Public key cryptosystems based on composite degree residuosity classes. In: Eurocrypt 1999 Proceedings of the 17th International Conference on Theory and Application of Cryptographic Techniques, pp. 2–6. ACM, Prague (1999)
Groth, J., Sahai, A.: Efficient non-interactive proof systems for bilinear groups. In: Smart, N. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 415–432. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-78967-3_24
Akhunzada, A., Gani, A., Anuar, N.B., et al.: Secure and dependable software defined networks. J. Netw. Comput. Appl. 61, 199–221 (2016)
Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, C.: Internet of things: vision, applications and research challenges. Ad Hoc Netw. 10(7), 1497–1516 (2012)
Porambage, P., Okwuibe, J., Liyanage, M., et al.: Survey on multi-access edge computing for internet of things realization. IEEE Commun. Surv. Tutorials 20(4), 2961–2991 (2018)
ur Rehman, S., et al.: Deep learning techniques for future intelligent cross-media retrieval. arXiv preprint arXiv:2008.01191. 2020 July 21
Zhong, N., et al.: Research challenges and perspectives on Wisdom Web of Things (W2T). J. Supercomput. 64(3), 862–882 (2013)
Lai, C., Lu, R., Zheng, D., Li, H., Shen, X.: Toward secure large-scale machine-to-machine communications in 3GPP networks. IEEE Comm. Mag. Suppl. (2015)
Tiburski, R.T., Amaral, L.A., de Matos, E., Hessel, F.: The importance of a standard security architecture for SOA - based IoT middleware. IEEE Commun. Mag. (2015)
Valerie Aurora, “Lifetimes of cryptographic hash functions” (2012). http://valerieaurora.org/hash.html
ETSI TR103 167 v0.3.1: Machine to Machine Communications (M2M); Threat Analysis and Counter Measures to M2M Service Layer (2011)
International Workshop on Big Data and Data Mining Challenges on IoT and Pervasive Systems (BigD2M 2015), New Security Architecture for IoT Network (2015)
Geneiatakis, D., Kounelis, I., Neisse, R., Nai-Fovino, I.: Security and privacy issues for an IoT based smart home. In: 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 1292–1297. IEEE Conference Publications (2017)
J. Comput. Commun. 3, 164–173 (2015). Published Online May 2015 in SciRes. http://www.scirp.org/journal/jcc https://doi.org/10.4236/jcc.2015.35021
Source: Cisco IBSG projections, UN Economic & Social Affairs. http://www.un.org/esa/population/publications/longrange2/WorldPop2300final.pdf
NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition, 2 October 2012. http://www.nist.gov/itl/csd/sha-100212.cfm
Ur Rehman, S., Bilal, M., Ahmad, B., Yahya, K.M., Ullah, A., Ur Rehman, O.: Comparison based analysis of different cryptographic and encryption techniques using message authentication code (MAC) in wireless sensor networks (WSN). arXiv preprint arXiv:1203.3103 (2012)
Ur Rehman, S., Tu, S., Huang, Y., Yang, Z.: Face recognition: a novel un-supervised convolutional neural network method. In 2016 IEEE International Conference of Online Analysis and Computing Science (ICOACS), pp. 139–144. IEEE (2016)
ur Rehman, O., Yang, S., Khan, S., Ur Rehman, S.: A quantum particle swarm optimizer with enhanced strategy for global optimization of electromagnetic devices. IEEE Trans. Mag. 55(8), 1–4 (2019)
Tu, S., Huang, Y., Liu, G.: CSFL: a novel unsupervised convolution neural network approach for visual pattern classification. AI Commun. 30(5), 311–324 (2017)
ur Rehman, S., Tu, S., Huang, Y., Ur Rehman, O.: A benchmark dataset and learning high-level semantic embeddings of multimedia for cross-media retrieval. IEEE Access 6, 67176–67188 (2018)
Ur Rehman, S., Tu, S., Ur Rehman, O., Huang, Y., Sarathchandra Magurawalage, C.M., Chang, C.-C.: Optimization of CNN through novel training strategy for visual classification problems. Entropy 20(4), 290 (2018)
Ur Rehman, S., et al.: Unsupervised pre-trained filter learning approach for efficient convolution neural network. Neurocomputing 365, 171–190 (2019)
ur Rehman, S., Huang, Y., Tu, S., ur Rehman, O.: Facebook5k: a novel evaluation resource dataset for cross-media search. In: Sun, X., Pan, Z., Bertino, E. (eds.) ICCCS 2018. LNCS, vol. 11063, pp. 512–524. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-00006-6_47
ur Rehman, S., Huang, Y., Tu, S., Ahmad, B.: Learning a semantic space for modeling images, tags and feelings in cross-media search. In: U., L.H., Lauw, H.W. (eds.) PAKDD 2019. LNCS (LNAI), vol. 11607, pp. 65–76. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-26142-9_7
Tu, S., et al.: ModPSO-CNN: an evolutionary convolution neural network with application to visual recognition. Soft Comput., 1–12 (2020)
ur Rehman, S., et lal.: Deep learning techniques for future intelligent cross-media retrieval
Tu, S., et al.: Optimisation-based training of evolutionary convolution neural network for visual classification applications. IET Comput. 14(5), 259–267 (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Talezari, M. et al. (2021). Recent Development, Trends and Challenges in IoT Security. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2021. Lecture Notes in Computer Science(), vol 12737. Springer, Cham. https://doi.org/10.1007/978-3-030-78612-0_51
Download citation
DOI: https://doi.org/10.1007/978-3-030-78612-0_51
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-78611-3
Online ISBN: 978-3-030-78612-0
eBook Packages: Computer ScienceComputer Science (R0)