International Journal of Sensors and Sensor Networks

| Peer-Reviewed |

Improvement of Security in IOT Sensor Network to Overcome Harmful Intruder by Optimizing the Existing Techniques

Received: 31 October 2017    Accepted: 13 November 2017    Published: 25 December 2017
Views:       Downloads:

Share This Article

Abstract

Internet of Things is the web of physical devices acquired through the Internet. These devices contain entrenched technology to connect with both internal environment or the external status. Internets of Things (IoT) devices are directly becoming ubiquitous while IoT services are becoming global. Cyber-intruders are not unique to IoT, but as it will be deeply merged in our lives and humankind, it is becoming essential to step up and take cyber protection seriously. With increasing use of it in diverse fields has improved the demands of various parameters, for an excessive degree of security and applications. In this paper, we have compared the variance in security features of new technology like Low-Power Wide Area (LPWA) network technologies: LoRaWAN and NB-IoT. The security features of every technology are specified in a comparison to demonstrate that security won't be the determining aspect while choosing on a LPWA technology. We describe the exceptional contributions that every characteristic makes the general security of a device and emphasize how the security functions may not or might be appropriate in our option of a LPWA technology, based on the designed use case. We consider whether the security functions of each technology are appropriate for a fixed of use cases representing standard deployments for every technology. Based on an assessment of an appropriate feature, we have calculated the performance of the security in each technology and the each use instances. After identifying the security problems in IoTs, this paper suggest answers from present technologies as a start line for establishing a standardized security paradigm in IoTs.

DOI 10.11648/j.ijssn.20170506.11
Published in International Journal of Sensors and Sensor Networks (Volume 5, Issue 6, December 2017)
Page(s) 70-75
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

IOT Technology, LoRaWAN, NB-IoT, Intruder, Security

References
[1] fhcouk.files.wordpress.com/2017/05/lpwatechnology-security-comparison.pdf
[2] Internet of Things – New security and privacy challenges: Rolf H. Weber - University of Zurich, Zurich, Switzerland, and University of Hong Kong, Hong Kong.
[3] The rise of ransomware and emerging security challenges in the Internet of Things (IOT). Available from: www.researchgate.net/publication/319527564_The_rise_of ansomware_and_emerging_security_challenges_in_the_Internet_of_Things [accessed Oct 06 2017].
[4] John A. Stankovic, Life Fellow, IEEE “Research Directions for the Internet of Things”.
[5] www.owasp.org/index.php/Top_IoT_Vulnerabilities.
[6] H Suo, J. Wan Security in the internet of things: Review, 2012 International Conference on computer Science and Electronics Engineering.
[7] The Information Security for the Application of IoT Technology: Jia Jiang and Donghai Yang.
[8] Miao Wu; Ting-Jie Lu; Fei-Yang Ling; Jing Sun; Hui-Ying Du, "Research on the architecture of Internet of Things," Advanced Computer Theory and Engineering (ICACTE), 2010 3rd International Conference, vol. 5, pp. V5-484, V5-487, 20-22 Aug. 2010 doi: 10.1109/ICACTE.2010.5579493.
[9] Lu Tan; Neng Wang, "Future internet: The Internet of Things," Advanced Computer Theory and Engineering (ICACTE), 2010 3rd International Conference, vol. 5, pp. V5-376, V5-380, 20-22 Aug. 2010 doi: 10.1109/ICACTE.2010.5579543.
[10] Castellani, A. P.; Bui, N.; Casari, P.; Rossi, M.; Shelby, Z.; Zorzi, M., "Architecture and protocols for the Internet of Things: A case study," Pervasive Computing and Communications Workshops (PERCOM Workshops), 2010 8th IEEE International Conference, pp. 678-683, March 29 2010-April 2 2010.
[11] Huansheng Ning; Ziou Wang, "Future Internet of Things Architecture: Like Mankind Neural System or Social Organization Framework?," Communications Letters, IEEE, vol. 15, no. 4, pp. 461-463, April 2011.
[12] Jonathande carvalhosilva, Joel J. P. C. Rodrigues, Antonio M. Alberti, Petar Solic, Andre L. L. Aquino, “ LoRa WAN-A Low Power WAN Protocol for Internet of Things: A Review and opportunities, Aug 02, 2017.
[13] Bhupjit Singh, Bipjeet Kaur, “Comparative study of Internet of Things Infrastructures & Security”, Oct 05, 2017.
[14] Aloÿs Augustin, Jiazi Yi, Thomas Clausen and William Mark Townsley, “A Study of LoRa: Long Range & Low Power Networks for the Internet of Things”, 9 September 16.
[15] Rashmi Sharan Sinha, Yiqiao Wei, Seung-Hoon Hwang, “A survey on LPWA technology: LoRa and NB-IoT”, d 4 January 2017.
[16] LoRa vs LTE-M vs Sigfox - www.nickhunn.com/lora-vs-lte-m-vssigfox/
[17] http://pages.silabs.com/rs/silabs/images/Wireless-Connectivity-
[18] http://link.springer.com/chapter/10.1007/978-3-662-43871-8_243?noaccess=true
[19] https://www.link-labs.com/what-is-sigfox/
[20] web.gdmec.cn/zlgcxm/2013/jxgg/xxljq/support/%E5%8
[21] http://www.radio-tronics.com/info/wireless/lora/basics-
Author Information
  • Department of ECE, Anna University, Chennai, India

  • Department of CSE, G. K. M College of Engineering, Chennai, India

Cite This Article
  • APA Style

    M. R. Arun, S. Selva Kumar. (2017). Improvement of Security in IOT Sensor Network to Overcome Harmful Intruder by Optimizing the Existing Techniques. International Journal of Sensors and Sensor Networks, 5(6), 70-75. https://doi.org/10.11648/j.ijssn.20170506.11

    Copy | Download

    ACS Style

    M. R. Arun; S. Selva Kumar. Improvement of Security in IOT Sensor Network to Overcome Harmful Intruder by Optimizing the Existing Techniques. Int. J. Sens. Sens. Netw. 2017, 5(6), 70-75. doi: 10.11648/j.ijssn.20170506.11

    Copy | Download

    AMA Style

    M. R. Arun, S. Selva Kumar. Improvement of Security in IOT Sensor Network to Overcome Harmful Intruder by Optimizing the Existing Techniques. Int J Sens Sens Netw. 2017;5(6):70-75. doi: 10.11648/j.ijssn.20170506.11

    Copy | Download

  • @article{10.11648/j.ijssn.20170506.11,
      author = {M. R. Arun and S. Selva Kumar},
      title = {Improvement of Security in IOT Sensor Network to Overcome Harmful Intruder by Optimizing the Existing Techniques},
      journal = {International Journal of Sensors and Sensor Networks},
      volume = {5},
      number = {6},
      pages = {70-75},
      doi = {10.11648/j.ijssn.20170506.11},
      url = {https://doi.org/10.11648/j.ijssn.20170506.11},
      eprint = {https://download.sciencepg.com/pdf/10.11648.j.ijssn.20170506.11},
      abstract = {Internet of Things is the web of physical devices acquired through the Internet. These devices contain entrenched technology to connect with both internal environment or the external status. Internets of Things (IoT) devices are directly becoming ubiquitous while IoT services are becoming global. Cyber-intruders are not unique to IoT, but as it will be deeply merged in our lives and humankind, it is becoming essential to step up and take cyber protection seriously. With increasing use of it in diverse fields has improved the demands of various parameters, for an excessive degree of security and applications. In this paper, we have compared the variance in security features of new technology like Low-Power Wide Area (LPWA) network technologies: LoRaWAN and NB-IoT. The security features of every technology are specified in a comparison to demonstrate that security won't be the determining aspect while choosing on a LPWA technology. We describe the exceptional contributions that every characteristic makes the general security of a device and emphasize how the security functions may not or might be appropriate in our option of a LPWA technology, based on the designed use case. We consider whether the security functions of each technology are appropriate for a fixed of use cases representing standard deployments for every technology. Based on an assessment of an appropriate feature, we have calculated the performance of the security in each technology and the each use instances. After identifying the security problems in IoTs, this paper suggest answers from present technologies as a start line for establishing a standardized security paradigm in IoTs.},
     year = {2017}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Improvement of Security in IOT Sensor Network to Overcome Harmful Intruder by Optimizing the Existing Techniques
    AU  - M. R. Arun
    AU  - S. Selva Kumar
    Y1  - 2017/12/25
    PY  - 2017
    N1  - https://doi.org/10.11648/j.ijssn.20170506.11
    DO  - 10.11648/j.ijssn.20170506.11
    T2  - International Journal of Sensors and Sensor Networks
    JF  - International Journal of Sensors and Sensor Networks
    JO  - International Journal of Sensors and Sensor Networks
    SP  - 70
    EP  - 75
    PB  - Science Publishing Group
    SN  - 2329-1788
    UR  - https://doi.org/10.11648/j.ijssn.20170506.11
    AB  - Internet of Things is the web of physical devices acquired through the Internet. These devices contain entrenched technology to connect with both internal environment or the external status. Internets of Things (IoT) devices are directly becoming ubiquitous while IoT services are becoming global. Cyber-intruders are not unique to IoT, but as it will be deeply merged in our lives and humankind, it is becoming essential to step up and take cyber protection seriously. With increasing use of it in diverse fields has improved the demands of various parameters, for an excessive degree of security and applications. In this paper, we have compared the variance in security features of new technology like Low-Power Wide Area (LPWA) network technologies: LoRaWAN and NB-IoT. The security features of every technology are specified in a comparison to demonstrate that security won't be the determining aspect while choosing on a LPWA technology. We describe the exceptional contributions that every characteristic makes the general security of a device and emphasize how the security functions may not or might be appropriate in our option of a LPWA technology, based on the designed use case. We consider whether the security functions of each technology are appropriate for a fixed of use cases representing standard deployments for every technology. Based on an assessment of an appropriate feature, we have calculated the performance of the security in each technology and the each use instances. After identifying the security problems in IoTs, this paper suggest answers from present technologies as a start line for establishing a standardized security paradigm in IoTs.
    VL  - 5
    IS  - 6
    ER  - 

    Copy | Download

  • Sections