Improvement of Security in IOT Sensor Network to Overcome Harmful Intruder by Optimizing the Existing Techniques
International Journal of Sensors and Sensor Networks
Volume 5, Issue 6, December 2017, Pages: 70-75
Received: Oct. 31, 2017; Accepted: Nov. 13, 2017; Published: Dec. 25, 2017
Views 1221      Downloads 69
Authors
M. R. Arun, Department of ECE, Anna University, Chennai, India
S. Selva Kumar, Department of CSE, G. K. M College of Engineering, Chennai, India
Article Tools
Follow on us
Abstract
Internet of Things is the web of physical devices acquired through the Internet. These devices contain entrenched technology to connect with both internal environment or the external status. Internets of Things (IoT) devices are directly becoming ubiquitous while IoT services are becoming global. Cyber-intruders are not unique to IoT, but as it will be deeply merged in our lives and humankind, it is becoming essential to step up and take cyber protection seriously. With increasing use of it in diverse fields has improved the demands of various parameters, for an excessive degree of security and applications. In this paper, we have compared the variance in security features of new technology like Low-Power Wide Area (LPWA) network technologies: LoRaWAN and NB-IoT. The security features of every technology are specified in a comparison to demonstrate that security won't be the determining aspect while choosing on a LPWA technology. We describe the exceptional contributions that every characteristic makes the general security of a device and emphasize how the security functions may not or might be appropriate in our option of a LPWA technology, based on the designed use case. We consider whether the security functions of each technology are appropriate for a fixed of use cases representing standard deployments for every technology. Based on an assessment of an appropriate feature, we have calculated the performance of the security in each technology and the each use instances. After identifying the security problems in IoTs, this paper suggest answers from present technologies as a start line for establishing a standardized security paradigm in IoTs.
Keywords
IOT Technology, LoRaWAN, NB-IoT, Intruder, Security
To cite this article
M. R. Arun, S. Selva Kumar, Improvement of Security in IOT Sensor Network to Overcome Harmful Intruder by Optimizing the Existing Techniques, International Journal of Sensors and Sensor Networks. Vol. 5, No. 6, 2017, pp. 70-75. doi: 10.11648/j.ijssn.20170506.11
Copyright
Copyright © 2017 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
References
[1]
fhcouk.files.wordpress.com/2017/05/lpwatechnology-security-comparison.pdf
[2]
Internet of Things – New security and privacy challenges: Rolf H. Weber - University of Zurich, Zurich, Switzerland, and University of Hong Kong, Hong Kong.
[3]
The rise of ransomware and emerging security challenges in the Internet of Things (IOT). Available from: www.researchgate.net/publication/319527564_The_rise_of ansomware_and_emerging_security_challenges_in_the_Internet_of_Things [accessed Oct 06 2017].
[4]
John A. Stankovic, Life Fellow, IEEE “Research Directions for the Internet of Things”.
[5]
www.owasp.org/index.php/Top_IoT_Vulnerabilities.
[6]
H Suo, J. Wan Security in the internet of things: Review, 2012 International Conference on computer Science and Electronics Engineering.
[7]
The Information Security for the Application of IoT Technology: Jia Jiang and Donghai Yang.
[8]
Miao Wu; Ting-Jie Lu; Fei-Yang Ling; Jing Sun; Hui-Ying Du, "Research on the architecture of Internet of Things," Advanced Computer Theory and Engineering (ICACTE), 2010 3rd International Conference, vol. 5, pp. V5-484, V5-487, 20-22 Aug. 2010 doi: 10.1109/ICACTE.2010.5579493.
[9]
Lu Tan; Neng Wang, "Future internet: The Internet of Things," Advanced Computer Theory and Engineering (ICACTE), 2010 3rd International Conference, vol. 5, pp. V5-376, V5-380, 20-22 Aug. 2010 doi: 10.1109/ICACTE.2010.5579543.
[10]
Castellani, A. P.; Bui, N.; Casari, P.; Rossi, M.; Shelby, Z.; Zorzi, M., "Architecture and protocols for the Internet of Things: A case study," Pervasive Computing and Communications Workshops (PERCOM Workshops), 2010 8th IEEE International Conference, pp. 678-683, March 29 2010-April 2 2010.
[11]
Huansheng Ning; Ziou Wang, "Future Internet of Things Architecture: Like Mankind Neural System or Social Organization Framework?," Communications Letters, IEEE, vol. 15, no. 4, pp. 461-463, April 2011.
[12]
Jonathande carvalhosilva, Joel J. P. C. Rodrigues, Antonio M. Alberti, Petar Solic, Andre L. L. Aquino, “ LoRa WAN-A Low Power WAN Protocol for Internet of Things: A Review and opportunities, Aug 02, 2017.
[13]
Bhupjit Singh, Bipjeet Kaur, “Comparative study of Internet of Things Infrastructures & Security”, Oct 05, 2017.
[14]
Aloÿs Augustin, Jiazi Yi, Thomas Clausen and William Mark Townsley, “A Study of LoRa: Long Range & Low Power Networks for the Internet of Things”, 9 September 16.
[15]
Rashmi Sharan Sinha, Yiqiao Wei, Seung-Hoon Hwang, “A survey on LPWA technology: LoRa and NB-IoT”, d 4 January 2017.
[16]
LoRa vs LTE-M vs Sigfox - www.nickhunn.com/lora-vs-lte-m-vssigfox/
[17]
http://pages.silabs.com/rs/silabs/images/Wireless-Connectivity-
[18]
http://link.springer.com/chapter/10.1007/978-3-662-43871-8_243?noaccess=true
[19]
https://www.link-labs.com/what-is-sigfox/
[20]
web.gdmec.cn/zlgcxm/2013/jxgg/xxljq/support/%E5%8
[21]
http://www.radio-tronics.com/info/wireless/lora/basics-
ADDRESS
Science Publishing Group
548 FASHION AVENUE
NEW YORK, NY 10018
U.S.A.
Tel: (001)347-688-8931