Abstract
In the age of the technology and in the field of Computer Networking, devices integrated with the Internet of Things (IoT) resulted in a variety of popular E-Health, E-Commerce and E-Home. The Internet of Things will be next revolutionary term in the today internet. An important function of the IoT is to create various types of technologies, standards and then to integrate them. Today, the capacities of IoT are improving by establishing security for both small and large applications. To help and determine the direction of future research, IoT security challenges and privacy issues will be highlighted in this chapter. The chapter analyzes compares and consolidates the existing research, presents new findings and discusses innovations in the security of the IoT. The challenges in this chapter must be addressed, if the full potential of IoT is to be realized.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Archive.org. (2016). Full text of “International Journal of Science and Research (IJSR)”. [online] Retrieved December 26, 2016, from https://archive.org/stream/MTMwOTEzMDI/MTIwMTMzNg==_djvu.txt
Dlodlo, N., & Kalezhi, J. (2015). The Internet of Things in agriculture for sustainable rural development. [online] Retrieved December 26, 2016, from https://www.researchgate.net/publication/277713549
Garg, G., Goyal, D., Aggarwal, H., Baindail, K., & Verma, G. (2016). Controlling home appliances in IOT environment. International Journal of Smart Home, 10(8), 11–18.
Hongyan, L. (2015). Design and realization of smart home terminal applications based on IOT technology. International Journal of Smart Home, 9(8), 123–132.
http://citeseerx.ist.psu.edu/. (2016). Intelligent traffic information system based on integration of Internet of Things and agent technology. [online] Retrieved December 26, 2016, from http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.695.2856&rep=rep1&type=pdf
https://www.uio.no. (2016). RFID and IOT: An overview. [online] Retrieved December 26, 2016, from https://www.uio.no/studier/emner/matnat/ifi/INF5910CPS/h10/undervisningsmateriale/RFID-IoT.pdf
Iot.ieee.org. (2016). Research challenges in the internet of mobile things - IEEE Internet of Things. [online] Retrieved December 26, 2016, from http://iot.ieee.org/newsletter/march-2016/research-challenges-in-the-internet-of-mobile-things.html
Jain, D., & Krishna, P. (n.d.). A study on Internet of Things based applications. [online] Retrieved December 26, 2016, from https://arxiv.org/ftp/arxiv/papers/1206/1206.3891.pdf
Journal, R. (2016). What would be the best way for a local supermarket to transition to RFID technology?. [online] Rfidjournal.com. Retrieved December 26, 2016, from http://www.rfidjournal.com/blogs/experts/entry?11504
Kim, W. (2016). The business model of IoT information sharing open market for promoting IoT service. Journal of the Korea Society of IT Services, 15(3), 195–209.
Lin, H., & Bergmann, N. (2016). IoT privacy and security challenges for smart home environments. Information, 7(3), 44.
Mehta, A., & Patel, S. (2016). IoT based smart agriculture research opportunities and challenges. International Journal for Technological Research in Engineering ISSN (Online), 4(3), 2347–4718. [online] Retrieved December 26, 2016, from http://www.ijtre.com/images/scripts/2016040325.pdf.
Rahul, G., & Patel, S. (2016). A review of smart shopping systems. [online] https://www.irjet.net. Retrieved December 26, 2016, from https://www.irjet.net/archives/V3/i5/IRJET-V3I5441.pdf
Shiryaev. (2016). RFID technology and Internet of Things. [online] Slideshare.net. Retrieved December 26, 2016, from http://www.slideshare.net/rushtek/rfid-and-internet-of-things
Vujovic, V., & Maksimovic, M. (2015). The impact of the ‘Internet of Things’ on engineering education. University of East Sarajevo Lukavica, Bosnia and Herzegovina. [online] Retrieved December 26, 2016, from http://www.citethisforme.com/cite/journal
Alam, M., Trapps, P., Mumtaz, S., & Rodriguez, J. (2016). Context-aware cooperative testbed for energy analysis in beyond 4G networks. Telecommunication Systems. https://doi.org/10.1007/s11235-016-0171-5
Khan, F., Rahman, F., Khan, S., & Kamal, S. A. (2018). Performance analysis of transport protocols for multimedia traffic over mobile Wi-Max network under Nakagami fading. In Information technology-New generations (pp. 101–110). Cham: Springer.
Alam, M., Albano, M., Radwan, A., & Rodriguez, J. (2013). CANDi: Context-aware node discovery for short-range cooperation. Transactions on Emerging Telecommunications Technologies, 26(5), 861–875. https://doi.org/10.1002/ett.2763
Khan, F., & Nakagawa, K. (2013). Comparative study of spectrum sensing techniques in cognitive radio networks. In 2013 World Congress on Computer and Information Technology (WCCIT) (pp. 1–8). IEEE.
Zebra Technology. (n.d.). How the Internet of Things is transforming education. [online] Retrieved December 26, 2016, from https://www.zebra.com/ap/en.html
Jan, M. A., Nanda, P., He, X., & Liu, R. P. (2014). PASCCC: Priority-based application-specific congestion control clustering protocol. Computer Networks, 74, 92–102.
Jan, M. A., Nanda, P., He, X., & Liu, R. P. (2015, August). A Sybil attack detection scheme for a centralized clustering-based hierarchical network. In 2015 IEEE Trustcom/BigDataSE/ISPA (Vol. 1, pp. 318–325). IEEE.
Khan, F. (2014, May). Fairness and throughput improvement in multihop wireless ad hoc networks. In 2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE) (pp. 1–6). IEEE.
Jan, M. A., Nanda, P., He, X., Tan, Z., & Liu, R. P. (2014, September). A robust authentication scheme for observing resources in the internet of things environment. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (pp. 205–211). IEEE.
Jan, M., Nanda, P., Usman, M., & He, X. (2017). PAWN: A payload-based mutual authentication scheme for wireless sensor networks. Concurrency and Computation: Practice and Experience, 29(17).
Jan, M. A., Nanda, P., He, X., & Liu, R. P. (2013, November). Enhancing lifetime and quality of data in cluster-based hierarchical routing protocol for wireless sensor network. In 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC_EUC) (pp.1400–1407). IEEE.
Jan, M. A., Nanda, P., He, X., & Liu, R. P. (2018). A Sybil attack detection scheme for a forest wildfire monitoring application. Future Generation Computer Systems, 80, 613–626.
Jan, M. A., Nanda, P., & He, X. (2013, June). Energy evaluation model for an improved centralized clustering hierarchical algorithm in WSN. In International Conference on Wired/Wireless Internet Communication (pp. 154–167). Berlin, Heidelberg: Springer.
Usman, M., Jan, M. A., & He, X. (2017). Cryptography-based secure data storage and sharing using HEVC and public clouds. Information Sciences, 387, 90–102.
Usman, M., Jan, M. A., He, X., & Nanda, P. (2016, August). Data sharing in secure multimedia wireless sensor networks. In 2016 IEEE Trustcom/BigDataSE/ISPA (pp. 590–597). IEEE.
Jan, M. A., Usman, M., He, X., & Rehman, A. U. (2018). SAMS: A seamless and authorized multimedia streaming framework for WMSN-based IoMT. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2018.2848284
Jan, M. A., Jan, S. R., Usman, M., & Alam, M. (2018). State-of-the-art congestion control protocols in WSN: A survey. IoT EAI. https://doi.org/10.4108/eai.26-3-2018.154379
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Begum, S., Nianmin, Y., Shah, S.B.H., Khan, I.U., Anamalamudi, S. (2019). Research Challenges in the Internet of Things (IoTs). In: Jan, M., Khan, F., Alam, M. (eds) Recent Trends and Advances in Wireless and IoT-enabled Networks. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-319-99966-1_24
Download citation
DOI: https://doi.org/10.1007/978-3-319-99966-1_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-99965-4
Online ISBN: 978-3-319-99966-1
eBook Packages: EngineeringEngineering (R0)