Security in IoT: Threats and Vulnerabilities, Layered Architecture, Encryption Mechanisms, Challenges and Solutions

Bahareh Pahlevanzadeh, Sara Koleini, Suzi Iryanti Fadilah

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In the future, every physical thing or object will be connected in scenarios that are divergent than merely connected human and make everything intelligent. As everything becomes connected and intelligent, it is driving digital transformation of all industries. However, the IoT brings with it, new security threats because the working IoT applications mechanisms are differ due to the heterogeneity nature of IoT environments. The comprehensive review of the security concerns with regards to the IoT layered architecture, encryption mechanisms, threats, and vulnerabilities is the major contribution of this paper. Furthermore, the IoT security challenges and solutions are emphasized by the layered architecture in order to get a greater understanding and knowledge on the addressing and implementing proper approaches to prevent the recent security threats in IoT on every layer.

Original languageEnglish
Title of host publicationAdvances in Cyber Security - Second International Conference, ACeS 2020, Revised Selected Papers
EditorsMohammed Anbar, Nibras Abdullah, Selvakumar Manickam
PublisherSpringer Science and Business Media Deutschland GmbH
Pages267-283
Number of pages17
ISBN (Print)9789813368347
DOIs
Publication statusPublished - 2021
Externally publishedYes
Event2nd International Conference on Advances in Cyber Security, ACeS 2020 - Penang, Malaysia
Duration: 8 Dec 20209 Dec 2020

Publication series

NameCommunications in Computer and Information Science
Volume1347
ISSN (Print)1865-0929
ISSN (Electronic)1865-0937

Conference

Conference2nd International Conference on Advances in Cyber Security, ACeS 2020
Country/TerritoryMalaysia
CityPenang
Period8/12/209/12/20

Keywords

  • Data security
  • IoT security
  • IoT security layered architecture
  • Lightweight block cipher
  • Lightweight encryption algorithms
  • Lightweight hash function
  • Lightweight stream cipher

Fingerprint

Dive into the research topics of 'Security in IoT: Threats and Vulnerabilities, Layered Architecture, Encryption Mechanisms, Challenges and Solutions'. Together they form a unique fingerprint.

Cite this