ResearchSpace

Security considerations in the Internet of Things Protocol Stack

Show simple item record

dc.contributor.author Nair, Kishor K
dc.contributor.author Nair, H
dc.date.accessioned 2021-11-26T09:00:10Z
dc.date.available 2021-11-26T09:00:10Z
dc.date.issued 2021-08
dc.identifier.citation Nair, K.K. & Nair, H. 2021. Security considerations in the Internet of Things Protocol Stack. http://hdl.handle.net/10204/12179 . en_ZA
dc.identifier.isbn 978-1-6654-1984-0
dc.identifier.isbn 978-1-6654-1983-3
dc.identifier.isbn 978-1-6654-4748-5
dc.identifier.uri DOI: 10.1109/icABCD51485.2021.9519377
dc.identifier.uri http://hdl.handle.net/10204/12179
dc.description.abstract Internet of Things (IoT) wireless devices has the capability to interconnect small footprint devices and its key purpose is to have seamless connection without operational barriers. It is built upon a three-layer (Perception, Transportation and Application) protocol stack architecture. A multitude of security principles must be imposed at each layer for the proper and efficient working of various IoT applications. In the forthcoming years, it is anticipated that IoT devices will be omnipresent, bringing several benefits. The intrinsic security issues in conjunction with the resource constraints in IoT devices enables the proliferation of security vulnerabilities. The absence of specifically designed IoT frameworks, specifications, and interoperability issues further exacerbate the challenges in the IoT arena. This paper conducts an investigation in IoT wireless security with a focus on the major security challenges and considerations from an IoT protocol stack perspective. The vulnerabilities in the IoT protocol stack are laid out along with a gap analysis, evaluation, and the discussion on countermeasures. At the end of this work, critical issues are highlighted with the aim of pointing towards future research directions and drawing conclusions out of it. en_US
dc.format Fulltext en_US
dc.language.iso en en_US
dc.relation.uri https://ieeexplore.ieee.org/document/9519377 en_US
dc.source 2021 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD), Durban, South Africa, 5-6 August 2021 en_US
dc.subject Internet of Things en_US
dc.subject IoT en_US
dc.subject IoT protocol stack en_US
dc.subject IoT wireless security en_US
dc.subject IoT protocol stack vulnerabilities en_US
dc.title Security considerations in the Internet of Things Protocol Stack en_US
dc.type Conference Presentation en_US
dc.description.pages 6 en_US
dc.description.note Coyright: 2021 IEEE. Due to copyright restrictions, the attached PDF file only contains the accepted version of the published item. For access to the published item, kindly consult the publisher's website. en_US
dc.description.cluster Defence and Security en_US
dc.description.impactarea Information & Cyber Security C en_US
dc.identifier.apacitation Nair, K. K., & Nair, H. (2021). Security considerations in the Internet of Things Protocol Stack. http://hdl.handle.net/10204/12179 en_ZA
dc.identifier.chicagocitation Nair, Kishor K, and H Nair. "Security considerations in the Internet of Things Protocol Stack." <i>2021 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD), Durban, South Africa, 5-6 August 2021</i> (2021): http://hdl.handle.net/10204/12179 en_ZA
dc.identifier.vancouvercitation Nair KK, Nair H, Security considerations in the Internet of Things Protocol Stack; 2021. http://hdl.handle.net/10204/12179 . en_ZA
dc.identifier.ris TY - Conference Presentation AU - Nair, Kishor K AU - Nair, H AB - Internet of Things (IoT) wireless devices has the capability to interconnect small footprint devices and its key purpose is to have seamless connection without operational barriers. It is built upon a three-layer (Perception, Transportation and Application) protocol stack architecture. A multitude of security principles must be imposed at each layer for the proper and efficient working of various IoT applications. In the forthcoming years, it is anticipated that IoT devices will be omnipresent, bringing several benefits. The intrinsic security issues in conjunction with the resource constraints in IoT devices enables the proliferation of security vulnerabilities. The absence of specifically designed IoT frameworks, specifications, and interoperability issues further exacerbate the challenges in the IoT arena. This paper conducts an investigation in IoT wireless security with a focus on the major security challenges and considerations from an IoT protocol stack perspective. The vulnerabilities in the IoT protocol stack are laid out along with a gap analysis, evaluation, and the discussion on countermeasures. At the end of this work, critical issues are highlighted with the aim of pointing towards future research directions and drawing conclusions out of it. DA - 2021-08 DB - ResearchSpace DP - CSIR J1 - 2021 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD), Durban, South Africa, 5-6 August 2021 KW - Internet of Things KW - IoT KW - IoT protocol stack KW - IoT wireless security KW - IoT protocol stack vulnerabilities LK - https://researchspace.csir.co.za PY - 2021 SM - 978-1-6654-1984-0 SM - 978-1-6654-1983-3 SM - 978-1-6654-4748-5 T1 - Security considerations in the Internet of Things Protocol Stack TI - Security considerations in the Internet of Things Protocol Stack UR - http://hdl.handle.net/10204/12179 ER - en_ZA
dc.identifier.worklist 25132 en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record