Internet of Things is the web of physical devices acquired through the Internet. These devices contain entrenched technology to connect with both internal environment or the external status. Internets of Things (IoT) devices are directly becoming ubiquitous while IoT services are becoming global. Cyber-intruders are not unique to IoT, but as it will be deeply merged in our lives and humankind, it is becoming essential to step up and take cyber protection seriously. With increasing use of it in diverse fields has improved the demands of various parameters, for an excessive degree of security and applications. In this paper, we have compared the variance in security features of new technology like Low-Power Wide Area (LPWA) network technologies: LoRaWAN and NB-IoT. The security features of every technology are specified in a comparison to demonstrate that security won't be the determining aspect while choosing on a LPWA technology. We describe the exceptional contributions that every characteristic makes the general security of a device and emphasize how the security functions may not or might be appropriate in our option of a LPWA technology, based on the designed use case. We consider whether the security functions of each technology are appropriate for a fixed of use cases representing standard deployments for every technology. Based on an assessment of an appropriate feature, we have calculated the performance of the security in each technology and the each use instances. After identifying the security problems in IoTs, this paper suggest answers from present technologies as a start line for establishing a standardized security paradigm in IoTs.
Published in | International Journal of Sensors and Sensor Networks (Volume 5, Issue 6) |
DOI | 10.11648/j.ijssn.20170506.11 |
Page(s) | 70-75 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2017. Published by Science Publishing Group |
IOT Technology, LoRaWAN, NB-IoT, Intruder, Security
[1] | fhcouk.files.wordpress.com/2017/05/lpwatechnology-security-comparison.pdf |
[2] | Internet of Things – New security and privacy challenges: Rolf H. Weber - University of Zurich, Zurich, Switzerland, and University of Hong Kong, Hong Kong. |
[3] | The rise of ransomware and emerging security challenges in the Internet of Things (IOT). Available from: www.researchgate.net/publication/319527564_The_rise_of ansomware_and_emerging_security_challenges_in_the_Internet_of_Things [accessed Oct 06 2017]. |
[4] | John A. Stankovic, Life Fellow, IEEE “Research Directions for the Internet of Things”. |
[5] | www.owasp.org/index.php/Top_IoT_Vulnerabilities. |
[6] | H Suo, J. Wan Security in the internet of things: Review, 2012 International Conference on computer Science and Electronics Engineering. |
[7] | The Information Security for the Application of IoT Technology: Jia Jiang and Donghai Yang. |
[8] | Miao Wu; Ting-Jie Lu; Fei-Yang Ling; Jing Sun; Hui-Ying Du, "Research on the architecture of Internet of Things," Advanced Computer Theory and Engineering (ICACTE), 2010 3rd International Conference, vol. 5, pp. V5-484, V5-487, 20-22 Aug. 2010 doi: 10.1109/ICACTE.2010.5579493. |
[9] | Lu Tan; Neng Wang, "Future internet: The Internet of Things," Advanced Computer Theory and Engineering (ICACTE), 2010 3rd International Conference, vol. 5, pp. V5-376, V5-380, 20-22 Aug. 2010 doi: 10.1109/ICACTE.2010.5579543. |
[10] | Castellani, A. P.; Bui, N.; Casari, P.; Rossi, M.; Shelby, Z.; Zorzi, M., "Architecture and protocols for the Internet of Things: A case study," Pervasive Computing and Communications Workshops (PERCOM Workshops), 2010 8th IEEE International Conference, pp. 678-683, March 29 2010-April 2 2010. |
[11] | Huansheng Ning; Ziou Wang, "Future Internet of Things Architecture: Like Mankind Neural System or Social Organization Framework?," Communications Letters, IEEE, vol. 15, no. 4, pp. 461-463, April 2011. |
[12] | Jonathande carvalhosilva, Joel J. P. C. Rodrigues, Antonio M. Alberti, Petar Solic, Andre L. L. Aquino, “ LoRa WAN-A Low Power WAN Protocol for Internet of Things: A Review and opportunities, Aug 02, 2017. |
[13] | Bhupjit Singh, Bipjeet Kaur, “Comparative study of Internet of Things Infrastructures & Security”, Oct 05, 2017. |
[14] | Aloÿs Augustin, Jiazi Yi, Thomas Clausen and William Mark Townsley, “A Study of LoRa: Long Range & Low Power Networks for the Internet of Things”, 9 September 16. |
[15] | Rashmi Sharan Sinha, Yiqiao Wei, Seung-Hoon Hwang, “A survey on LPWA technology: LoRa and NB-IoT”, d 4 January 2017. |
[16] | LoRa vs LTE-M vs Sigfox - www.nickhunn.com/lora-vs-lte-m-vssigfox/ |
[17] | http://pages.silabs.com/rs/silabs/images/Wireless-Connectivity- |
[18] | http://link.springer.com/chapter/10.1007/978-3-662-43871-8_243?noaccess=true |
[19] | https://www.link-labs.com/what-is-sigfox/ |
[20] | web.gdmec.cn/zlgcxm/2013/jxgg/xxljq/support/%E5%8 |
[21] | http://www.radio-tronics.com/info/wireless/lora/basics- |
APA Style
M. R. Arun, S. Selva Kumar. (2017). Improvement of Security in IOT Sensor Network to Overcome Harmful Intruder by Optimizing the Existing Techniques. International Journal of Sensors and Sensor Networks, 5(6), 70-75. https://doi.org/10.11648/j.ijssn.20170506.11
ACS Style
M. R. Arun; S. Selva Kumar. Improvement of Security in IOT Sensor Network to Overcome Harmful Intruder by Optimizing the Existing Techniques. Int. J. Sens. Sens. Netw. 2017, 5(6), 70-75. doi: 10.11648/j.ijssn.20170506.11
AMA Style
M. R. Arun, S. Selva Kumar. Improvement of Security in IOT Sensor Network to Overcome Harmful Intruder by Optimizing the Existing Techniques. Int J Sens Sens Netw. 2017;5(6):70-75. doi: 10.11648/j.ijssn.20170506.11
@article{10.11648/j.ijssn.20170506.11, author = {M. R. Arun and S. Selva Kumar}, title = {Improvement of Security in IOT Sensor Network to Overcome Harmful Intruder by Optimizing the Existing Techniques}, journal = {International Journal of Sensors and Sensor Networks}, volume = {5}, number = {6}, pages = {70-75}, doi = {10.11648/j.ijssn.20170506.11}, url = {https://doi.org/10.11648/j.ijssn.20170506.11}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ijssn.20170506.11}, abstract = {Internet of Things is the web of physical devices acquired through the Internet. These devices contain entrenched technology to connect with both internal environment or the external status. Internets of Things (IoT) devices are directly becoming ubiquitous while IoT services are becoming global. Cyber-intruders are not unique to IoT, but as it will be deeply merged in our lives and humankind, it is becoming essential to step up and take cyber protection seriously. With increasing use of it in diverse fields has improved the demands of various parameters, for an excessive degree of security and applications. In this paper, we have compared the variance in security features of new technology like Low-Power Wide Area (LPWA) network technologies: LoRaWAN and NB-IoT. The security features of every technology are specified in a comparison to demonstrate that security won't be the determining aspect while choosing on a LPWA technology. We describe the exceptional contributions that every characteristic makes the general security of a device and emphasize how the security functions may not or might be appropriate in our option of a LPWA technology, based on the designed use case. We consider whether the security functions of each technology are appropriate for a fixed of use cases representing standard deployments for every technology. Based on an assessment of an appropriate feature, we have calculated the performance of the security in each technology and the each use instances. After identifying the security problems in IoTs, this paper suggest answers from present technologies as a start line for establishing a standardized security paradigm in IoTs.}, year = {2017} }
TY - JOUR T1 - Improvement of Security in IOT Sensor Network to Overcome Harmful Intruder by Optimizing the Existing Techniques AU - M. R. Arun AU - S. Selva Kumar Y1 - 2017/12/25 PY - 2017 N1 - https://doi.org/10.11648/j.ijssn.20170506.11 DO - 10.11648/j.ijssn.20170506.11 T2 - International Journal of Sensors and Sensor Networks JF - International Journal of Sensors and Sensor Networks JO - International Journal of Sensors and Sensor Networks SP - 70 EP - 75 PB - Science Publishing Group SN - 2329-1788 UR - https://doi.org/10.11648/j.ijssn.20170506.11 AB - Internet of Things is the web of physical devices acquired through the Internet. These devices contain entrenched technology to connect with both internal environment or the external status. Internets of Things (IoT) devices are directly becoming ubiquitous while IoT services are becoming global. Cyber-intruders are not unique to IoT, but as it will be deeply merged in our lives and humankind, it is becoming essential to step up and take cyber protection seriously. With increasing use of it in diverse fields has improved the demands of various parameters, for an excessive degree of security and applications. In this paper, we have compared the variance in security features of new technology like Low-Power Wide Area (LPWA) network technologies: LoRaWAN and NB-IoT. The security features of every technology are specified in a comparison to demonstrate that security won't be the determining aspect while choosing on a LPWA technology. We describe the exceptional contributions that every characteristic makes the general security of a device and emphasize how the security functions may not or might be appropriate in our option of a LPWA technology, based on the designed use case. We consider whether the security functions of each technology are appropriate for a fixed of use cases representing standard deployments for every technology. Based on an assessment of an appropriate feature, we have calculated the performance of the security in each technology and the each use instances. After identifying the security problems in IoTs, this paper suggest answers from present technologies as a start line for establishing a standardized security paradigm in IoTs. VL - 5 IS - 6 ER -