A Review on IoT Security Architecture: Attacks, Protocols, Trust Management Issues, and Elliptic Curve Cryptography

1Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Internet of Things has become popular for the industrial and commercial environment and also for research purpose by providing a large number of applications that facilitate human daily and social life more comprehensible and convenient. Internet of Things amalgamates various kinds of sensors, actuators, and physical object to communicate with each other directly even in the absence of a human. For the formation of the IoT-equipped devices and network, security and trust among various parties are major concerns. Here, we discuss the security and privacy available at each layer of the IoT model and also the limitation and future direction that can be implemented to enhance IoT security architecture. However, trustworthy channel must be necessary for secure communication, and here, we also discuss elliptic curve light-weighted encryption technology used for trust management in IoT.

Cite

CITATION STYLE

APA

Agrawal, L., & Tiwari, N. (2020). A Review on IoT Security Architecture: Attacks, Protocols, Trust Management Issues, and Elliptic Curve Cryptography. In Lecture Notes in Networks and Systems (Vol. 100, pp. 457–465). Springer. https://doi.org/10.1007/978-981-15-2071-6_36

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free