Connectivity of Smart Devices: Addressing the Security Challenges of the Internet of Things

  • Aikins S
N/ACitations
Citations of this article
15Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The Internet of Things (IoT) entails interconnection of smart devices in a network based on the possibility of seamless integration of physical objects such as sensors or home appliances which can be loosely defined as a network of interface that explores a piece of functionality [1]. IoT is a network of billions of addressable, smart, mobile, and possibly, minuscule devices [2]. It promises a revolution in computing and communications technology and also offers revolution in the way we live, potentially providing intelligent support in all aspects of our lives [3]. While there is no global consensus on the meaning of the term, it is clear that the main idea behind the IoT concept is the ability to connect loosely defined smart objects and enable them to interact with other objects, the environment, or more complex and legacy computing devices [4]. New developments in radio-frequency identification (RFID) and wireless sensor networks (WSNs) mean that more things can be interconnected, tracked, and even made intelligent, with the hope of benefiting society. Despite its huge potential, there are numerous concerns about the security and privacy of IoT. A crucial data management challenge for the IoT is that of maintaining appropriate security in a wireless environment. The wireless environment of IoT allows the network to go where wires cannot go. Users are no longer limited to certain workplaces, but this mobility and flexibility have properties inherently different from those of conven-tional networks, with major implications for security vulnerabilities [2]. Given the security and privacy concerns of IoT, a high degree of reliability is needed in order for the concept to gain wider acceptance. The purpose of this chapter is to discuss some of the security concerns of IoT, as well as some existing and in-progress security protocols and technologies for addressing those concerns. The rest of the chapter is organized as the following sections: domain areas of IoT and security implications, the benefits of secured IoT to society, IoT security challenges and related research, security automation and interoperability require-ments of IoT, and security protocols and solutions to IoT challenges.

Cite

CITATION STYLE

APA

Aikins, S. K. (2016). Connectivity of Smart Devices: Addressing the Security Challenges of the Internet of Things (pp. 333–350). https://doi.org/10.1007/978-3-319-33124-9_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free