Skip to main content

Privacy and Security Challenges in Internet of Things

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8956))

Abstract

Internet of Things (IoT) envisions as a global network, connecting any objects around us, ranging from home appliances, wearable things to military applications. With IoT infrastructure, physical objects such as wearable objects, television, refrigerator, smart phones, supply-chain items and any objects across the globe would get connected using the Internet. Sensing, radio waves, mobile technology, embedded systems and Internet technology are promising actors which play significant roles in IoT infrastructure. Security and privacy issues in IoT scenarios would be much more challenging than what is been used in the conventional wireless scenarios. In particular, the constrained environments require lightweight primitives, secure design and effective integration into other environments in order to see IoT in its desired shape. In this paper, we discuss security and privacy challenges in IoT scenarios and applications with special emphasis on resource-constrained environments’ security objectives and privacy requirement. We provide different perspectives of IoT, discuss about important driving forces of IoT, and propose a generic construction of secure protocol suitable for constrained environments with respect to IoT scenarios and applications.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sarma, S., Brock, D.L., Ashton, K.: The Networked Physical World. MIT Auto-ID Center (2000)

    Google Scholar 

  2. European Commission: Internet of Things - An action plan for Europe, http://europa.eu/legislation_summaries/information_society/internet/si0009_en.htm (accessed January 2014)

  3. Yan, L., Zhang, Y., Yang, L.T., Ning, H.: The Internet Of Things. Auerbach Publications, Taylor and Francis Group, New York (2008)

    Book  Google Scholar 

  4. Das, M.L.: Strong Security and Privacy of RFID System for Internet of Things Infrastructure. In: Gierlichs, B., Guilley, S., Mukhopadhyay, D. (eds.) SPACE 2013. LNCS, vol. 8204, pp. 56–69. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  5. Callaway Jr., E.H.: Wireless Sensor Networks. Architectures and Protocols. Auerbach Publications (2003)

    Google Scholar 

  6. Shelby, Z., Hartke, K., Bormann, C.: The Constrained Application Protocol (CoAP). RFC 7252 (June 2014), https://tools.ietf.org/html/rfc7252 (accessed July 2014)

  7. Kushalnagar, N., Montenegro, G., Schumacher, C.: IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs). RFC 4919 (August 2007), http://www.ietf.org/rfc/rfc4919.txt (accessed December 2013)

  8. Roman, R., Najera, P., Lopez, J.: Securing the Internet of Things. IEEE Computer 44(9), 51–58 (2011)

    Article  Google Scholar 

  9. ISO/IEC 14443-2:2001. Identification cards – Contactless integrated circuit(s) cards – Proximity cards – Part 2: Radio frequency power and signal interface

    Google Scholar 

  10. Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer (2004)

    Google Scholar 

  11. ZigBee Specification, http://www.zigbee.org/Specifications.aspx (accessed December 2013)

  12. Rescorla, E., Modadugu, N.: Datagram Transport Layer Security. RFC 4347 (April 2006), https://tools.ietf.org/html/rfc4347 (accessed December 2013)

  13. Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol. RFC 5246 (August 2008), http://www.rfc-base.org/txt/rfc-5246.txt (accessed December 2013)

  14. Songhela, R., Das, M.L.: Yet Another Strong Privacy-Preserving RFID Mutual Authentication Protocol. In: Chakraborty, R.S., Matyas, V., Schaumont, P. (eds.) SPACE 2014. LNCS, vol. 8804, pp. 171–182. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Das, M.L. (2015). Privacy and Security Challenges in Internet of Things. In: Natarajan, R., Barua, G., Patra, M.R. (eds) Distributed Computing and Internet Technology. ICDCIT 2015. Lecture Notes in Computer Science, vol 8956. Springer, Cham. https://doi.org/10.1007/978-3-319-14977-6_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-14977-6_3

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-14976-9

  • Online ISBN: 978-3-319-14977-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics