A Comprehensive Survey of Security Related Challenges in Internet of Things

E. Ezema, Nfm Sani A.Abdullah
{"title":"A Comprehensive Survey of Security Related Challenges in Internet of Things","authors":"E. Ezema, Nfm Sani A.Abdullah","doi":"10.17781/P002493","DOIUrl":null,"url":null,"abstract":"The IoT network is a decentralized type of network which can sense information and transmit the information to a base station. Due to small size of the sensor nodes, energy consumption and security is seen as the major challenge to the IoT network. The LEACH is the energy efficient protocol which can divide the whole network into fixed size clusters. In each cluster, the cluster heads are selected, to transmit data to base station. The cluster heads are selected in the network based on the energy of each node and distance from sensor node to base station. The energy of the sensor node is dissipated when each node receives or transmits data to the base station. The energy is also consumed when the sensor nodes aggregate data to cluster head. In this paper, we analyze existing research works in IoT system and proposed security approaches. In the literature, we have studied that many related challenges have been discovered and work on, but they are still open challenges to these different approaches and techniques. The paper highlights various security challenges of IoT and contributions from researcher.","PeriodicalId":211757,"journal":{"name":"International journal of new computer architectures and their applications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International journal of new computer architectures and their applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.17781/P002493","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

The IoT network is a decentralized type of network which can sense information and transmit the information to a base station. Due to small size of the sensor nodes, energy consumption and security is seen as the major challenge to the IoT network. The LEACH is the energy efficient protocol which can divide the whole network into fixed size clusters. In each cluster, the cluster heads are selected, to transmit data to base station. The cluster heads are selected in the network based on the energy of each node and distance from sensor node to base station. The energy of the sensor node is dissipated when each node receives or transmits data to the base station. The energy is also consumed when the sensor nodes aggregate data to cluster head. In this paper, we analyze existing research works in IoT system and proposed security approaches. In the literature, we have studied that many related challenges have been discovered and work on, but they are still open challenges to these different approaches and techniques. The paper highlights various security challenges of IoT and contributions from researcher.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
物联网安全相关挑战综述
物联网网络是一种分散类型的网络,可以感知信息并将信息传输到基站。由于传感器节点体积小,能耗和安全被视为物联网网络的主要挑战。LEACH是一种高效节能的协议,它可以将整个网络划分为固定大小的簇。在每个簇中,选择簇头,将数据传输到基站。根据每个节点的能量和传感器节点到基站的距离在网络中选择簇头。当每个节点接收或向基站发送数据时,传感器节点的能量会被耗散。当传感器节点将数据聚合到簇头时,也会消耗能量。在本文中,我们分析了物联网系统的现有研究工作,并提出了安全方法。在文献中,我们研究了许多相关的挑战已经被发现和研究,但它们仍然是这些不同方法和技术的开放挑战。本文重点介绍了物联网的各种安全挑战和研究人员的贡献。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Introduction to Sociology of Online Social Networks in Morocco. Data Acquisition Process: Results and Connectivity Analysis SLA-BASED RESOURCE ALLOCATION WITHIN CLOUD NETWORKING ENVIRONMENT Proportional Weighted Round Robin: A Proportional Share CPU Scheduler inTime Sharing Systems Variation Effect of Silicon Film Thickness on Electrical Properties of NANOMOSFET CAUSALITY ISSUES IN ORIENTATION CONTROL OF AN UNDER-ACTUATED DRILL MACHINE
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1