Skip to main content

A Review on IoT Security Architecture: Attacks, Protocols, Trust Management Issues, and Elliptic Curve Cryptography

  • Conference paper
  • First Online:
Social Networking and Computational Intelligence

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 100))

Abstract

Internet of Things has become popular for the industrial and commercial environment and also for research purpose by providing a large number of applications that facilitate human daily and social life more comprehensible and convenient. Internet of Things amalgamates various kinds of sensors, actuators, and physical object to communicate with each other directly even in the absence of a human. For the formation of the IoT-equipped devices and network, security and trust among various parties are major concerns. Here, we discuss the security and privacy available at each layer of the IoT model and also the limitation and future direction that can be implemented to enhance IoT security architecture. However, trustworthy channel must be necessary for secure communication, and here, we also discuss elliptic curve light-weighted encryption technology used for trust management in IoT.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Alaba FA, Othman M, Hashem IAT, Alotaibi F (2017) Internet of things security: a survey. J Netw Comput Appl 88:10–28

    Article  Google Scholar 

  2. Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54:2787–2805

    Article  Google Scholar 

  3. Fraga-Lamas P, Fernández-Caramés TM, Suárez-Albela M, Castedo L, González-López M (2016) A review on internet of things for defense and public safety. Sensors MDPI

    Google Scholar 

  4. Farooq MU, Waseem M, Khairi A, Mazhar S (2015) A critical analysis on the security concerns of internet of things (IoT). Int J Comput Appl (IJCA) 111(7)

    Google Scholar 

  5. Kouicem DE, Bouabdallah A, Lakhlef H (2018) Internet of things security: a top-down survey. Comput Netw 141:199–221

    Article  Google Scholar 

  6. Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for internet of things. J Netw Comput Appl 42:120–134

    Article  Google Scholar 

  7. Granjal J, Monteiro E, Silva JS (2015) Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun Surv Tutor 17(3):1294–1312

    Article  Google Scholar 

  8. Daubert J, Wiesmaier A, Kikirasa P (2015) A view on privacy & trust in IoT. In: IEEE International Conference on Communication (ICC), London, UK

    Google Scholar 

  9. Suryani V, Selo, Widyawan (2016) A survey on trust in internet of things. In: 8th International Conference on Informational Technology and Electrical Engineering (ICITEE), Yogyakarta, Indonesia

    Google Scholar 

  10. Yao X, Chen Z, Tian Y (2015) A lightweight attribute-based encryption scheme for the internet of things. Futur Gener Comput Syst 49:104–112

    Article  Google Scholar 

  11. Anwar S, Kishore D (2016) IOT based smart home security system with alert and door access control using smart phone. Int J Eng Res Technol (IJERT) 5(S12). ISSN: 2278-0181

    Google Scholar 

  12. He D, Zeadally S (2015) An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography. IEEE Internet Things J 2:72–83

    Article  Google Scholar 

  13. Chatzigiannakis L, Vitaletti A, Pyrgelis A (2016) A privacy-preserving smart parking system using an IoT elliptic curve based security platform. Comput Commun 89–90:165–177

    Article  Google Scholar 

  14. Martínez VG, Encinas LH, Ávila CS (2010) A survey of the elliptic curve integrated encryption scheme. J. Comput Sci Eng 2

    Google Scholar 

  15. Forouzan BA (2007) Cryptography and network security. Tata McGraw-Hill

    Google Scholar 

  16. Liu Z, Grobschadl J, Hu Z, Jarvinen K, Wang H, Verbauwhede I (2017) Elliptic curve cryptography with efficiently computable endomorphisms and its hardware implementations for the internet of things. IEEE Trans Comput 66(5)

    Article  MathSciNet  Google Scholar 

  17. Chernyshev M, Baig Z, Bello O, Zeadally S (2018) Internet of things (IoT): research, simulators, and testbeds. IEEE Internet Things J 5:1637–1647

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lalita Agrawal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Agrawal, L., Tiwari, N. (2020). A Review on IoT Security Architecture: Attacks, Protocols, Trust Management Issues, and Elliptic Curve Cryptography. In: Shukla, R., Agrawal, J., Sharma, S., Chaudhari, N., Shukla, K. (eds) Social Networking and Computational Intelligence. Lecture Notes in Networks and Systems, vol 100. Springer, Singapore. https://doi.org/10.1007/978-981-15-2071-6_36

Download citation

Publish with us

Policies and ethics