skip to main content
10.1145/3167486.3167554acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccwcsConference Proceedingsconference-collections
research-article

Internet of Things Protocols Comparison, Architecture, Vulnerabilities and Security: State of the art

Published: 14 November 2017 Publication History

Abstract

The internet of things is a topical subject, which consists in connecting the objects to each other in order to communicate via networks. This communication is managed by protocols to ensure the proper exchange of information and data while respecting the rules imposed by the various standards organization. As communications progresses, the annoying question arises, how to enhance the security of these exchanges? The purpose of this paper is to give a state of the art of the main protocols that manage the communication between connected objects in the IoT domain, list the faults of each protocol and the proposed solutions until now, and finally, compare these existing protocols according to their functionalities and characteristics.

References

[1]
Ahmadi, Sassan, "Mobile WiMAX, A Systems Approach to Understanding IEEE 802.16m Radio Access Technology" CHAPTER 3 ISBN: 978-0-12-374964-2 2011
[2]
E. Ferro, F. Potorti, "Bluetooth and Wi-Fi wireless protocols: a survey and a comparison", IEEE Wireless Communications (Volume: 12, Issue: 1, Feb. 2005). P 12 - 26
[3]
Shahid Raza, Simon Duquennoy, Joel Höglund, Utz Roedig, Thiemo Voigt " Secure communication for the Internet of Things---a comparison of link-layer security and IPsec for 6LoWPAN " Special Issue Paper: Security and communication networks journal, 2012.
[4]
Oluwadamilola OshinEmail authorOluyinka OniAderemi AtayeroBabasanjo Oshin, "Leveraging MMWAVE Technology for Mobile Broadband/Internet of Things", Transactions on Engineering Technologies journal, pp 507--514, 2015, Springer Link.
[5]
S Vinjosh Reddy, K Sai Ramani, K Rijutha, "Wireless hacking - a WiFi hack by cracking WEP" 22-24 June 2010, Shanghai, China
[6]
SudhakarEmail authorR. K. Aggarwal, "A Security Approach and Prevention Technique against ARP Poisoning", International Conference on Information and Communication Technology for Intelligent Systems, (ICTIS 2017) - Volume 1 pp 39--49, Springer Link.
[7]
Arash Habibi Lashkari, Mir Mohammad Seyed Danesh, Behrang Samadi, "A survey on wireless security protocols (WEP, WPA and WPA2/802.11i)", 2009 2nd IEEE International Conference on Computer Science and Information Technology, 8--11 Aug. 2009.
[8]
Tom Rowan, Network Security, Volume 2010, Issue 2, February 2010, Pages 8--12, "Negotiating WiFi security"
[9]
S. Poorana Senthilkumar, C. Kumuthini, P. Dineshkumar, "A REVIEW OF MAC ADDRESS FILTERING AND SPOOFING IN WINDOWS OPERATING SYSTEM", Vol 3, No 5 (2017), E-ISSN No: 2454-9916
[10]
Raffaele Bruno, Marco Conti, Enrico Gregori, April 2002, Volume 5, Issue 2, pp 117--131, "Bluetooth: Architecture, Protocols and Scheduling Algorithms"
[11]
P. McDermott-Wells, "What is Bluetooth?", IEEE Potentials (Volume: 23, Issue: 5, Dec. 2004-Jan. 2005), P 33--35,
[12]
Dennis Browning, Gary C. Kessler, "Bluetooth Hacking: A Case Study, Journal of Digital Forensics, Security and Law", Volume 4 | Number 2 Article 4:
[13]
John Padgette, John Bahr, Mayank Batra, Marcel Holtmann, Rhonda Smithbey, Lidong Chen, Karen Scarfone, "Guide to Bluetooth Security", National institute of standars and technology, 2017
[14]
Brian Hernacki, Journal Information Systems Security, Volume 15, 2006 -Issue 4, "Improving Bluetooth Security: What IT Managers and Mobile Device Users Can Do", Pages 39--42 | Published online: 21 Dec 2006
[15]
Naveed Ashraf Chattha, NFC --- Vulnerabilities and defense, 2014 Conference on Information Assurance and Cyber Security (CIACS), 12-13 June 2014, Rawalpindi, Pakistan, Pakistan
[16]
S.Kavya, K.Pavithra, Sujitha Rajaram, M. Vahini, N Harini, "Vulnerability Analysis And Security System For NFC-Enabled Mobile Phones", IJSTR©2014, INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 3, ISSUE 6, JUNE 2014 ISSN 2277-8616
[17]
D. Egan, "The emergence of ZigBee in building automation and industrial controls", Volume 16, Issue 2, April 2005, p. 14--19
[18]
Bo Chen, Mingguang Wu, Shuai Yao, "ZigBee Technology and Its Application on Wireless Meter-reading System", 16--18 Aug. 2006, 2006 4th IEEE International Conference on Industrial Informatics, Singapore, Singapore
[19]
Gianluca Dini, Marco Tiloca, "Considerations on Security in ZigBee Networks", 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, Newport Beach, CA, USA
[20]
Yassine Chahid, Mohammed Benabdellah and Abdelmalek Azizi, "Internet of Things Security", International Conference on WIreless Technologies, embedded and intelligent Systems - WITS-2017, April 19-20, 2017, Fez- Morocco.

Cited By

View all
  • (2024)Desarrollo de aplicaciones IoT: metodologías y estrategiasIoT Application Development: Methodologies and StrategiesEuropean Public & Social Innovation Review10.31637/epsir-2024-13759(1-18)Online publication date: 21-Oct-2024
  • (2024)Cyber security in smart agricultureComputers and Electronics in Agriculture10.1016/j.compag.2024.109401226:COnline publication date: 1-Nov-2024
  • (2023)Machine Learning for Healthcare-IoT Security: A Review and Risk MitigationIEEE Access10.1109/ACCESS.2023.334632011(145869-145896)Online publication date: 2023
  • Show More Cited By

Index Terms

  1. Internet of Things Protocols Comparison, Architecture, Vulnerabilities and Security: State of the art

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        ICCWCS'17: Proceedings of the 2nd International Conference on Computing and Wireless Communication Systems
        November 2017
        512 pages
        ISBN:9781450353069
        DOI:10.1145/3167486
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 14 November 2017

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. Architecture
        2. Internet of Things
        3. Network
        4. Protocols
        5. Security

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Conference

        ICCWCS'17

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)60
        • Downloads (Last 6 weeks)6
        Reflects downloads up to 17 Feb 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Desarrollo de aplicaciones IoT: metodologías y estrategiasIoT Application Development: Methodologies and StrategiesEuropean Public & Social Innovation Review10.31637/epsir-2024-13759(1-18)Online publication date: 21-Oct-2024
        • (2024)Cyber security in smart agricultureComputers and Electronics in Agriculture10.1016/j.compag.2024.109401226:COnline publication date: 1-Nov-2024
        • (2023)Machine Learning for Healthcare-IoT Security: A Review and Risk MitigationIEEE Access10.1109/ACCESS.2023.334632011(145869-145896)Online publication date: 2023
        • (2022)A Formal Verification of ArpON – A Tool for Avoiding Man-in-the-Middle Attacks in Ethernet NetworksIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2021.311844819:6(4082-4098)Online publication date: 1-Nov-2022
        • (2022)Extended Lifetime of IoT Applications using Energy Saving Schemes2022 International Conference on Future Trends in Smart Communities (ICFTSC)10.1109/ICFTSC57269.2022.10040064(93-97)Online publication date: 1-Dec-2022
        • (2022)A Compact Wideband Antenna with DGS for IoT Applications using LoRa Technology2022 10th International Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing (ICETET-SIP-22)10.1109/ICETET-SIP-2254415.2022.9791725(1-4)Online publication date: 29-Apr-2022
        • (2021)Smart Hospitals and Cyber Security AttacksDigital Technologies and Applications10.1007/978-3-030-73882-2_27(291-300)Online publication date: 26-Jun-2021

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media