Internet of things: the concept, inherent security challenges and recommended solutions
The exponential growth observed as well as predicted in the development and deployment of the Internet of Things (IoT) based applications in every walk of our life brings forth the mandatory requirement of the secure communication system which is seamless yet effective in the highly heterogeneous a...
Saved in:
Main Authors: | , , , , , |
---|---|
Other Authors: | |
Format: | Book Chapter |
Language: | English |
Published: |
Springer, Singapore
2019
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/75995/1/75995_Internet%20of%20things%20the%20concept.pdf http://irep.iium.edu.my/75995/ https://link.springer.com/chapter/10.1007/978-981-13-8614-5_5 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Islam Antarabangsa Malaysia |
Language: | English |
id |
my.iium.irep.75995 |
---|---|
record_format |
dspace |
spelling |
my.iium.irep.759952020-01-23T09:12:17Z http://irep.iium.edu.my/75995/ Internet of things: the concept, inherent security challenges and recommended solutions Khan, Burhan Ul Islam Olanrewaju, Rashidah Funke Anwar, Farhat Mir, Roohie Naaz Oussama, Allama Jusoh, Ahmad Zamani TK7885 Computer engineering The exponential growth observed as well as predicted in the development and deployment of the Internet of Things (IoT) based applications in every walk of our life brings forth the mandatory requirement of the secure communication system which is seamless yet effective in the highly heterogeneous and resource-constrained network. The core philosophy of the proposed research work is that existing cryptographic modelling will be required to be scaled down for its complexities by investigating the actual communication problems in security protocols between sensor nodes, Internet host, data centres, cloud clusters, virtual machines, etc. The inclusion of more operational actions while modelling security protocols is highly prioritised in the proposed research work. In this paper, the prime emphasis is (i) to establish secure pipelining using novel public-key cryptography between the sensor network and Internet host, (ii) a robust authentication scheme considering both local and global IoT to offer better secure pervasiveness in its applications, and (iii) to apply optimisation towards key management techniques. Springer, Singapore Elhoseny, Mohamed Singh, Amit Kumar 2019-07-21 Book Chapter PeerReviewed application/pdf en http://irep.iium.edu.my/75995/1/75995_Internet%20of%20things%20the%20concept.pdf Khan, Burhan Ul Islam and Olanrewaju, Rashidah Funke and Anwar, Farhat and Mir, Roohie Naaz and Oussama, Allama and Jusoh, Ahmad Zamani (2019) Internet of things: the concept, inherent security challenges and recommended solutions. In: Smart Network Inspired Paradigm and Approaches in IoT Applications. Springer, Singapore, pp. 63-86. ISBN 978-981-13-8613-8 https://link.springer.com/chapter/10.1007/978-981-13-8614-5_5 |
institution |
Universiti Islam Antarabangsa Malaysia |
building |
IIUM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
International Islamic University Malaysia |
content_source |
IIUM Repository (IREP) |
url_provider |
http://irep.iium.edu.my/ |
language |
English |
topic |
TK7885 Computer engineering |
spellingShingle |
TK7885 Computer engineering Khan, Burhan Ul Islam Olanrewaju, Rashidah Funke Anwar, Farhat Mir, Roohie Naaz Oussama, Allama Jusoh, Ahmad Zamani Internet of things: the concept, inherent security challenges and recommended solutions |
description |
The exponential growth observed as well as predicted in the development and deployment of the Internet of Things (IoT) based applications in every walk of our life brings forth the mandatory requirement of the secure communication
system which is seamless yet effective in the highly heterogeneous and resource-constrained network. The core philosophy of the proposed research work is that existing cryptographic modelling will be required to be scaled down for its complexities
by investigating the actual communication problems in security protocols between sensor nodes, Internet host, data centres, cloud clusters, virtual machines, etc. The inclusion of more operational actions while modelling security protocols is
highly prioritised in the proposed research work. In this paper, the prime emphasis is (i) to establish secure pipelining using novel public-key cryptography between the sensor network and Internet host, (ii) a robust authentication scheme considering
both local and global IoT to offer better secure pervasiveness in its applications, and (iii) to apply optimisation towards key management techniques. |
author2 |
Elhoseny, Mohamed |
author_facet |
Elhoseny, Mohamed Khan, Burhan Ul Islam Olanrewaju, Rashidah Funke Anwar, Farhat Mir, Roohie Naaz Oussama, Allama Jusoh, Ahmad Zamani |
format |
Book Chapter |
author |
Khan, Burhan Ul Islam Olanrewaju, Rashidah Funke Anwar, Farhat Mir, Roohie Naaz Oussama, Allama Jusoh, Ahmad Zamani |
author_sort |
Khan, Burhan Ul Islam |
title |
Internet of things: the concept, inherent security challenges
and recommended solutions |
title_short |
Internet of things: the concept, inherent security challenges
and recommended solutions |
title_full |
Internet of things: the concept, inherent security challenges
and recommended solutions |
title_fullStr |
Internet of things: the concept, inherent security challenges
and recommended solutions |
title_full_unstemmed |
Internet of things: the concept, inherent security challenges
and recommended solutions |
title_sort |
internet of things: the concept, inherent security challenges
and recommended solutions |
publisher |
Springer, Singapore |
publishDate |
2019 |
url |
http://irep.iium.edu.my/75995/1/75995_Internet%20of%20things%20the%20concept.pdf http://irep.iium.edu.my/75995/ https://link.springer.com/chapter/10.1007/978-981-13-8614-5_5 |
_version_ |
1657565930798972928 |