Security aspects and efforts towards secure Internet of things

Abstract—Internet of Things (IoT) consists of wired and wireless devices, typically supplied with minimum physical resources including limited computational and communication resources. Most of the devices are distinguished by their low bandwidth, short range, scarce memory capacity, limited process...

Full description

Saved in:
Bibliographic Details
Main Authors: Wan Abdul Rahman, Wan Fariza, Hassan Abdalla Hashim, Aisha, Islam, Md. Rafiqul
Format: Article
Language:English
English
Published: Universiti Teknikal Malaysia Melaka (UTEM) 2017
Subjects:
Online Access:http://irep.iium.edu.my/60140/1/60140_Security%20Aspects%20and%20Efforts%20Towards.pdf
http://irep.iium.edu.my/60140/2/60140_Security%20Aspects%20and%20Efforts%20Towards_SCOPUS.pdf
http://irep.iium.edu.my/60140/
http://journal.utem.edu.my/index.php/jtec/article/view/2235
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Islam Antarabangsa Malaysia
Language: English
English
id my.iium.irep.60140
record_format dspace
spelling my.iium.irep.601402017-12-18T01:23:51Z http://irep.iium.edu.my/60140/ Security aspects and efforts towards secure Internet of things Wan Abdul Rahman, Wan Fariza Hassan Abdalla Hashim, Aisha Islam, Md. Rafiqul TK7885 Computer engineering Abstract—Internet of Things (IoT) consists of wired and wireless devices, typically supplied with minimum physical resources including limited computational and communication resources. Most of the devices are distinguished by their low bandwidth, short range, scarce memory capacity, limited processing capability and other attributes of inexpensive hardware. The resulting networks are more prone to traffic loss and other vulnerabilities. One of the potential networking challenges is to ensure the network communication among these deployed devices remains secure at less processing and communication overhead, and small packet size. The purpose of this paper is to highlight possible security attacks in Low Power and Lossy Networks (LLNs) as identifying pertinent security issues is an initial step to design the effective countermeasures. The IETF efforts in relevance to security implementation of this type of network are presented with focus on layer-2 and authentication mechanism at upper layer. Universiti Teknikal Malaysia Melaka (UTEM) 2017-11-17 Article REM application/pdf en http://irep.iium.edu.my/60140/1/60140_Security%20Aspects%20and%20Efforts%20Towards.pdf application/pdf en http://irep.iium.edu.my/60140/2/60140_Security%20Aspects%20and%20Efforts%20Towards_SCOPUS.pdf Wan Abdul Rahman, Wan Fariza and Hassan Abdalla Hashim, Aisha and Islam, Md. Rafiqul (2017) Security aspects and efforts towards secure Internet of things. Journal of Telecommunication, Electronic and Computer Engineering, 9 (2-2). pp. 147-152. ISSN 2180-1843 http://journal.utem.edu.my/index.php/jtec/article/view/2235
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
English
topic TK7885 Computer engineering
spellingShingle TK7885 Computer engineering
Wan Abdul Rahman, Wan Fariza
Hassan Abdalla Hashim, Aisha
Islam, Md. Rafiqul
Security aspects and efforts towards secure Internet of things
description Abstract—Internet of Things (IoT) consists of wired and wireless devices, typically supplied with minimum physical resources including limited computational and communication resources. Most of the devices are distinguished by their low bandwidth, short range, scarce memory capacity, limited processing capability and other attributes of inexpensive hardware. The resulting networks are more prone to traffic loss and other vulnerabilities. One of the potential networking challenges is to ensure the network communication among these deployed devices remains secure at less processing and communication overhead, and small packet size. The purpose of this paper is to highlight possible security attacks in Low Power and Lossy Networks (LLNs) as identifying pertinent security issues is an initial step to design the effective countermeasures. The IETF efforts in relevance to security implementation of this type of network are presented with focus on layer-2 and authentication mechanism at upper layer.
format Article
author Wan Abdul Rahman, Wan Fariza
Hassan Abdalla Hashim, Aisha
Islam, Md. Rafiqul
author_facet Wan Abdul Rahman, Wan Fariza
Hassan Abdalla Hashim, Aisha
Islam, Md. Rafiqul
author_sort Wan Abdul Rahman, Wan Fariza
title Security aspects and efforts towards secure Internet of things
title_short Security aspects and efforts towards secure Internet of things
title_full Security aspects and efforts towards secure Internet of things
title_fullStr Security aspects and efforts towards secure Internet of things
title_full_unstemmed Security aspects and efforts towards secure Internet of things
title_sort security aspects and efforts towards secure internet of things
publisher Universiti Teknikal Malaysia Melaka (UTEM)
publishDate 2017
url http://irep.iium.edu.my/60140/1/60140_Security%20Aspects%20and%20Efforts%20Towards.pdf
http://irep.iium.edu.my/60140/2/60140_Security%20Aspects%20and%20Efforts%20Towards_SCOPUS.pdf
http://irep.iium.edu.my/60140/
http://journal.utem.edu.my/index.php/jtec/article/view/2235
_version_ 1643615735556079616