Internet of things: the concept, inherent security challenges and recommended solutions

The exponential growth observed as well as predicted in the development and deployment of the Internet of Things (IoT) based applications in every walk of our life brings forth the mandatory requirement of the secure communication system which is seamless yet effective in the highly heterogeneous a...

Full description

Saved in:
Bibliographic Details
Main Authors: Khan, Burhan Ul Islam, Olanrewaju, Rashidah Funke, Anwar, Farhat, Mir, Roohie Naaz, Oussama, Allama, Jusoh, Ahmad Zamani
Other Authors: Elhoseny, Mohamed
Format: Book Chapter
Language:English
Published: Springer, Singapore 2019
Subjects:
Online Access:http://irep.iium.edu.my/75995/1/75995_Internet%20of%20things%20the%20concept.pdf
http://irep.iium.edu.my/75995/
https://link.springer.com/chapter/10.1007/978-981-13-8614-5_5
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Islam Antarabangsa Malaysia
Language: English
Description
Summary:The exponential growth observed as well as predicted in the development and deployment of the Internet of Things (IoT) based applications in every walk of our life brings forth the mandatory requirement of the secure communication system which is seamless yet effective in the highly heterogeneous and resource-constrained network. The core philosophy of the proposed research work is that existing cryptographic modelling will be required to be scaled down for its complexities by investigating the actual communication problems in security protocols between sensor nodes, Internet host, data centres, cloud clusters, virtual machines, etc. The inclusion of more operational actions while modelling security protocols is highly prioritised in the proposed research work. In this paper, the prime emphasis is (i) to establish secure pipelining using novel public-key cryptography between the sensor network and Internet host, (ii) a robust authentication scheme considering both local and global IoT to offer better secure pervasiveness in its applications, and (iii) to apply optimisation towards key management techniques.