3. Threat analysis and attack modeling for machine-to-machine communication toward Internet of things

  • Railkar P
  • N. Mahalle P
  • Shinde G
  • et al.
N/ACitations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

The wide variety of Internet of thing (IoT) applications demands a secure and efficient communication channel that resists against a variety of modern attacks and fulfils application requirement. There are various IoT threats and challenges that must be addressed to make a communication secure in IoT. As growth in devices increases with their potential misuse, so there is a need to integrate security features into the available IoT algorithms and protocols. At the same time, we need to design new IoT protocols and algorithms for extended features of machine-to-machine (M2M) communication. This chapter has proposed a protocol stack that is mapped to the Transmission Control Protocol/Internet Protocol (TCP/IP) which is used for communication and connection of network devices on internet. The protocol present in a particular layer must acquire a security feature of associated layer. This chapter also elaborates on M2M communication in IoT. This chapter presents and discusses the literature survey corresponding to access control mechanism and trust management policies. From the literature survey it is observed that the existing security protocols, methods and algorithms are not suitable for IoT resource-constrained environment. The various resource-constrained devices are unable to cope up with different attacks. This chapter gives detailed analysis of attacks with its behavioral modeling. If the reader understands how attacks happen, then it will be easy to investigate solutions. From the extensive literature survey this chapter has drawn gap analysis, which gives insight into security requirements of IoT protocols and security algorithm. In addition, the chapter proposes a novel security framework that emphasizes on making secure communication layer with the help of trust management policies, distributed access control framework and privacy-aware protocols.

Cite

CITATION STYLE

APA

Railkar, P. N., N. Mahalle, P., Shinde, G. R., & Bhapkar, H. R. (2019). 3. Threat analysis and attack modeling for machine-to-machine communication toward Internet of things. In The Internet of Everything (pp. 45–72). De Gruyter. https://doi.org/10.1515/9783110628517-004

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free