Title | Secure Internet-of- Things: Assessing Challenges and Scopes for NextGen Communication |
Publication Type | Conference Proceedings |
Year of Conference | 2019 |
Authors | Gowtham, M., M. K. Banga, and M. Patil |
Conference Name | 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies, ICICICT 2019 |
Pagination | 151 - 158 |
Date Published | 2019 |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
ISBN Number | 9781728102832 (ISBN) |
Keywords | Computer Science and Engineering, Scopus |
Abstract | The exponential rises in wireless communication technologies and allied application demands have revitalized academia-industries to achieve more efficient Quality of Service (QoS) centric communication solutions. To achieve it, in the last few years Internet-of-Things (IoT) technology has emerged as a potential solution. However, ensuring QoS provision and reliable communication across the network has always been a challenge for research community. Being a highly interfaced and complex paradigm IoT requires assuring secure communication across the network to achieve QoS and reliable data transmission. Assuring end-to-end security in IoT has revitalized academia-industries to develop more effective solution by developing advanced cryptosystem methods; however maintaining lightweight computation, seamless communication and QoS delivery simultaneously has been a driving force behind numerous ongoing researches. With this motive, in this paper emphasis is made on studying and assessing different security challenges in IoT ecosystem, solutions proposed so far and scopes for further optimization so as to develop a more effective IoT security system. The survey paper revealed that though numerous efforts have been made to augment IoT communication security, majority of the classical approaches either undergoes high computational overheads or impacts QoS delivery with real-time network solution. Additionally, it reveals that most of the existing systems focus on using single cryptosystem for communication security; however it fails alleviating different attack scenarios with different breaching actions. Majority of the existing approaches are found confined to address the security-vulnerabilities such asSmart Card Loss Attack (SCLA), offline password guessing using Brute Force attack, sensor node spoofing, privileged-insider and Session specific temporary information attack (SSTIA), etc. It suggests designing a robust security model with lightweight cryptosystem armored with multilevel security and authentication system. © 2019 IEEE. |
DOI | 10.1109/ICICICT46008.2019.8993327 |
Short Title | Int. Conf. Intell. Comput., Instrum. Control Technol., ICICICT |