Internet of things: the concept, inherent security challenges and recommended solutions

The exponential growth observed as well as predicted in the development and deployment of the Internet of Things (IoT) based applications in every walk of our life brings forth the mandatory requirement of the secure communication system which is seamless yet effective in the highly heterogeneous a...

Full description

Saved in:
Bibliographic Details
Main Authors: Khan, Burhan Ul Islam, Olanrewaju, Rashidah Funke, Anwar, Farhat, Mir, Roohie Naaz, Oussama, Allama, Jusoh, Ahmad Zamani
Other Authors: Elhoseny, Mohamed
Format: Book Chapter
Language:English
Published: Springer, Singapore 2019
Subjects:
Online Access:http://irep.iium.edu.my/75995/1/75995_Internet%20of%20things%20the%20concept.pdf
http://irep.iium.edu.my/75995/
https://link.springer.com/chapter/10.1007/978-981-13-8614-5_5
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Islam Antarabangsa Malaysia
Language: English
id my.iium.irep.75995
record_format dspace
spelling my.iium.irep.759952020-01-23T09:12:17Z http://irep.iium.edu.my/75995/ Internet of things: the concept, inherent security challenges and recommended solutions Khan, Burhan Ul Islam Olanrewaju, Rashidah Funke Anwar, Farhat Mir, Roohie Naaz Oussama, Allama Jusoh, Ahmad Zamani TK7885 Computer engineering The exponential growth observed as well as predicted in the development and deployment of the Internet of Things (IoT) based applications in every walk of our life brings forth the mandatory requirement of the secure communication system which is seamless yet effective in the highly heterogeneous and resource-constrained network. The core philosophy of the proposed research work is that existing cryptographic modelling will be required to be scaled down for its complexities by investigating the actual communication problems in security protocols between sensor nodes, Internet host, data centres, cloud clusters, virtual machines, etc. The inclusion of more operational actions while modelling security protocols is highly prioritised in the proposed research work. In this paper, the prime emphasis is (i) to establish secure pipelining using novel public-key cryptography between the sensor network and Internet host, (ii) a robust authentication scheme considering both local and global IoT to offer better secure pervasiveness in its applications, and (iii) to apply optimisation towards key management techniques. Springer, Singapore Elhoseny, Mohamed Singh, Amit Kumar 2019-07-21 Book Chapter PeerReviewed application/pdf en http://irep.iium.edu.my/75995/1/75995_Internet%20of%20things%20the%20concept.pdf Khan, Burhan Ul Islam and Olanrewaju, Rashidah Funke and Anwar, Farhat and Mir, Roohie Naaz and Oussama, Allama and Jusoh, Ahmad Zamani (2019) Internet of things: the concept, inherent security challenges and recommended solutions. In: Smart Network Inspired Paradigm and Approaches in IoT Applications. Springer, Singapore, pp. 63-86. ISBN 978-981-13-8613-8 https://link.springer.com/chapter/10.1007/978-981-13-8614-5_5
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
topic TK7885 Computer engineering
spellingShingle TK7885 Computer engineering
Khan, Burhan Ul Islam
Olanrewaju, Rashidah Funke
Anwar, Farhat
Mir, Roohie Naaz
Oussama, Allama
Jusoh, Ahmad Zamani
Internet of things: the concept, inherent security challenges and recommended solutions
description The exponential growth observed as well as predicted in the development and deployment of the Internet of Things (IoT) based applications in every walk of our life brings forth the mandatory requirement of the secure communication system which is seamless yet effective in the highly heterogeneous and resource-constrained network. The core philosophy of the proposed research work is that existing cryptographic modelling will be required to be scaled down for its complexities by investigating the actual communication problems in security protocols between sensor nodes, Internet host, data centres, cloud clusters, virtual machines, etc. The inclusion of more operational actions while modelling security protocols is highly prioritised in the proposed research work. In this paper, the prime emphasis is (i) to establish secure pipelining using novel public-key cryptography between the sensor network and Internet host, (ii) a robust authentication scheme considering both local and global IoT to offer better secure pervasiveness in its applications, and (iii) to apply optimisation towards key management techniques.
author2 Elhoseny, Mohamed
author_facet Elhoseny, Mohamed
Khan, Burhan Ul Islam
Olanrewaju, Rashidah Funke
Anwar, Farhat
Mir, Roohie Naaz
Oussama, Allama
Jusoh, Ahmad Zamani
format Book Chapter
author Khan, Burhan Ul Islam
Olanrewaju, Rashidah Funke
Anwar, Farhat
Mir, Roohie Naaz
Oussama, Allama
Jusoh, Ahmad Zamani
author_sort Khan, Burhan Ul Islam
title Internet of things: the concept, inherent security challenges and recommended solutions
title_short Internet of things: the concept, inherent security challenges and recommended solutions
title_full Internet of things: the concept, inherent security challenges and recommended solutions
title_fullStr Internet of things: the concept, inherent security challenges and recommended solutions
title_full_unstemmed Internet of things: the concept, inherent security challenges and recommended solutions
title_sort internet of things: the concept, inherent security challenges and recommended solutions
publisher Springer, Singapore
publishDate 2019
url http://irep.iium.edu.my/75995/1/75995_Internet%20of%20things%20the%20concept.pdf
http://irep.iium.edu.my/75995/
https://link.springer.com/chapter/10.1007/978-981-13-8614-5_5
_version_ 1657565930798972928