dc.contributor.author |
Nair, Kishor K
|
|
dc.contributor.author |
Nair, H
|
|
dc.date.accessioned |
2021-11-26T09:00:10Z |
|
dc.date.available |
2021-11-26T09:00:10Z |
|
dc.date.issued |
2021-08 |
|
dc.identifier.citation |
Nair, K.K. & Nair, H. 2021. Security considerations in the Internet of Things Protocol Stack. http://hdl.handle.net/10204/12179 . |
en_ZA |
dc.identifier.isbn |
978-1-6654-1984-0 |
|
dc.identifier.isbn |
978-1-6654-1983-3 |
|
dc.identifier.isbn |
978-1-6654-4748-5 |
|
dc.identifier.uri |
DOI: 10.1109/icABCD51485.2021.9519377
|
|
dc.identifier.uri |
http://hdl.handle.net/10204/12179
|
|
dc.description.abstract |
Internet of Things (IoT) wireless devices has the capability to interconnect small footprint devices and its key purpose is to have seamless connection without operational barriers. It is built upon a three-layer (Perception, Transportation and Application) protocol stack architecture. A multitude of security principles must be imposed at each layer for the proper and efficient working of various IoT applications. In the forthcoming years, it is anticipated that IoT devices will be omnipresent, bringing several benefits. The intrinsic security issues in conjunction with the resource constraints in IoT devices enables the proliferation of security vulnerabilities. The absence of specifically designed IoT frameworks, specifications, and interoperability issues further exacerbate the challenges in the IoT arena. This paper conducts an investigation in IoT wireless security with a focus on the major security challenges and considerations from an IoT protocol stack perspective. The vulnerabilities in the IoT protocol stack are laid out along with a gap analysis, evaluation, and the discussion on countermeasures. At the end of this work, critical issues are highlighted with the aim of pointing towards future research directions and drawing conclusions out of it. |
en_US |
dc.format |
Fulltext |
en_US |
dc.language.iso |
en |
en_US |
dc.relation.uri |
https://ieeexplore.ieee.org/document/9519377 |
en_US |
dc.source |
2021 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD), Durban, South Africa, 5-6 August 2021 |
en_US |
dc.subject |
Internet of Things |
en_US |
dc.subject |
IoT |
en_US |
dc.subject |
IoT protocol stack |
en_US |
dc.subject |
IoT wireless security |
en_US |
dc.subject |
IoT protocol stack vulnerabilities |
en_US |
dc.title |
Security considerations in the Internet of Things Protocol Stack |
en_US |
dc.type |
Conference Presentation |
en_US |
dc.description.pages |
6 |
en_US |
dc.description.note |
Coyright: 2021 IEEE. Due to copyright restrictions, the attached PDF file only contains the accepted version of the published item. For access to the published item, kindly consult the publisher's website. |
en_US |
dc.description.cluster |
Defence and Security |
en_US |
dc.description.impactarea |
Information & Cyber Security C |
en_US |
dc.identifier.apacitation |
Nair, K. K., & Nair, H. (2021). Security considerations in the Internet of Things Protocol Stack. http://hdl.handle.net/10204/12179 |
en_ZA |
dc.identifier.chicagocitation |
Nair, Kishor K, and H Nair. "Security considerations in the Internet of Things Protocol Stack." <i>2021 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD), Durban, South Africa, 5-6 August 2021</i> (2021): http://hdl.handle.net/10204/12179 |
en_ZA |
dc.identifier.vancouvercitation |
Nair KK, Nair H, Security considerations in the Internet of Things Protocol Stack; 2021. http://hdl.handle.net/10204/12179 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Nair, Kishor K
AU - Nair, H
AB - Internet of Things (IoT) wireless devices has the capability to interconnect small footprint devices and its key purpose is to have seamless connection without operational barriers. It is built upon a three-layer (Perception, Transportation and Application) protocol stack architecture. A multitude of security principles must be imposed at each layer for the proper and efficient working of various IoT applications. In the forthcoming years, it is anticipated that IoT devices will be omnipresent, bringing several benefits. The intrinsic security issues in conjunction with the resource constraints in IoT devices enables the proliferation of security vulnerabilities. The absence of specifically designed IoT frameworks, specifications, and interoperability issues further exacerbate the challenges in the IoT arena. This paper conducts an investigation in IoT wireless security with a focus on the major security challenges and considerations from an IoT protocol stack perspective. The vulnerabilities in the IoT protocol stack are laid out along with a gap analysis, evaluation, and the discussion on countermeasures. At the end of this work, critical issues are highlighted with the aim of pointing towards future research directions and drawing conclusions out of it.
DA - 2021-08
DB - ResearchSpace
DP - CSIR
J1 - 2021 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD), Durban, South Africa, 5-6 August 2021
KW - Internet of Things
KW - IoT
KW - IoT protocol stack
KW - IoT wireless security
KW - IoT protocol stack vulnerabilities
LK - https://researchspace.csir.co.za
PY - 2021
SM - 978-1-6654-1984-0
SM - 978-1-6654-1983-3
SM - 978-1-6654-4748-5
T1 - Security considerations in the Internet of Things Protocol Stack
TI - Security considerations in the Internet of Things Protocol Stack
UR - http://hdl.handle.net/10204/12179
ER -
|
en_ZA |
dc.identifier.worklist |
25132 |
en_US |