Total views : 1224

A Survey of Security in Internet of Things – Importance and Solutions


  • Reva University, Bangalore - 560064, Karnataka, India
  • Department of ECE, Jyothy Institute of Technology, Bangalore - 560082, Karnataka, India
  • School of Computing and Information Technology, Reva University, Bangalore - 560064, Karnataka, India


Background: Internet of Things (IoT) has the potential for societal, environmental as well as economic impact. This comes with a huge responsibility, that of securing all the communications, data and participating things. Method: Surveys and comparative studies are used for understanding the security in IoT. Findings: This paper surveys the IoT at the architectural and protocol stack level. We outline an effective architectural and stack level restructuring. The integration issues at the IPv6 enabled Low Power Wireless Personal Area Network (6LoWPAN) layer along with the security challenges and existing solutions are discussed and summarized under the chosen parameters. These parameters are Privacy, Authentication, Confidentiality, Denial of Service (DOS) Protect, Replay Protect, Impersonate Protect, End-to-End(E2E) Security.


Internet of Things, 6LoWPAN, Security.

Full Text:

 |  (PDF views: 718)


  • Haller S, Karnouskos S, Schroth C. The internet of things in an enterprise context: Springer, 2009.
  • Coetzee L, Eksteen J. The Internet of Things-promise for the future? An introduction. IST-Africa Conference Proceedings, 2011, 2011. p. 1–9.
  • Gubbi J, Buyya R, Marusic S, Palaniswami M. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems. 2013; 29:1645–60.
  • Sun C. Application of RFID technology for logistics on internet of things. AASRI Procedia. 2012; 1:106–11.
  • Akyildiz IF, Vuran MC. Wireless sensor networks. John Wiley & Sons, 2010; 4.
  • Juels A. RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications. 2006; 24:381–94.
  • Thompson DR, Di J, Daugherty MK. Teaching RFID Information Systems Security. IEEE Transactions on Education. 2014; 57:42–7.
  • Mitrokotsa A, Douligeris C. Integrated RFID and sensor networks: architectures and applications. RFID and sensor networks: Architectures, protocols, security and integrations. 2009; 511–35.
  • Hyuk Park J, Gritzalis S, Hsu C-H, Roman R, Lopez J. Integrating wireless sensor networks and the internet: a security analysis. Internet Research. 2009; 19:246–59.
  • Liu J, Yang L. Application of Internet of Things in the community security management. 2011 Third International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN). 2011. p. 314–8.
  • Fleisch E. What is the internet of things? An economic perspective. Economics, Management, and Financial Markets. 2010; 125–57.
  • Vermesan O, Friess P, Guillemin P, Gusmeroli S, Sundmaeker H, Bassi A et al. Internet of things strategic research roadmap. Internet of Things: Global Technological and Societal Trends. 2011; 1:9–52.
  • Wu M, Lu T-l, Ling F-Y, Sun L, Du H-Y. Research on the architecture of Internet of things. 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE). 2010. p. V5-484–V5-487.
  • Sajjad SM, Yousaf M. Security analysis of IEEE 802.15.4 MAC in the context of Internet of Things (IoT). 2014 Conference on Information Assurance and Cyber Security (CIACS). 2014. p. 9–14.
  • Bagci IE, Raza S, Chung T, Roedig U, Voigt T. Combined secure storage and communication for the internet of things. 2013 10th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON). 2013. p. 523–31.
  • Xin M, Wei L. The Analysis of 6LowPAN Technology. Pacific-Asia Workshop on Computational Intelligence and Industrial Application, 2008. PACIIA '08. 2008; 963–6.
  • Chen Y, Kun-Mean H, Haiying Z, Hong-Ling S, Xing L, Xunxing D et al. 6LoWPAN Stacks: A Survey. 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). 2011. p. 1–4.
  • Pediredla B, Kevin IKW, Salcic Z, Ivoghlian A. A 6LoWPAN implementation for memory constrained and power efficient wireless sensor nodes. IECON 2013 - 39th Annual Conference of the IEEE in Industrial Electronics Society. 2013. p. 4432–7.
  • Gardasevic G, Mijovic S, Stajkic A, Buratti C. On the performance of 6LoWPAN through experimentation. 2015 International in Wireless Communications and Mobile Computing Conference (IWCMC). 2015. p. 696–701.
  • Sehgal A, Perelman V, Kuryla S, Schonwalder J. Management of resource constrained devices in the internet of things. Communications Magazine, IEEE. 2012; 50:144–9.
  • Kai F, Chen L, Hui L, Yintang Y. LRMAPC: A Lightweight RFID Mutual Authentication Protocol with Cache in the Reader for IoT. 2014 IEEE International Conference on Computer and Information Technology (CIT). 2014. p. 276–80.
  • Raza S, Duquennoy S, Chung T, Yazar D, Voigt T, Roedig U. Securing communication in 6LoWPAN with compressed IPsec. 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS). 2011. p. 1–8.
  • Capossele A, Cervo V, De Cicco G, Petrioli C. Security as a CoAP resource: An optimized DTLS implementation for the IoT. 2015 IEEE International Conference on Communications (ICC). 2015. p. 549–54.
  • Raza S, Trabalza D, Voigt T. 6LoWPAN Compressed DTLS for CoAP. 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems (DCOSS). 2012. p. 287–9.
  • Goswami S, Misra S, Taneja C, Mukherjee A. Securing intra-communication in 6LoWPAN: A PKI integrated scheme. 2014 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS). 2014. p. 1–5.
  • Mesrinejad F, Hashim F, Noordin NK, Rasid MFA, Raja Abdullah RSA. The effect of fragmentation and header compression on IP-based sensor networks (6LoWPAN). 2011 17th Asia-Pacific Conference on Communications (APCC). 2011. p. 845–9.
  • Hennebert C, Dos Santos J. Security Protocols and Privacy Issues into 6LoWPAN Stack: A Synthesis. Internet of Things Journal, IEEE. 2014; 1:384–98.
  • Yue Q, Maode M. An authentication and key establishment scheme to enhance security for M2M in 6LoWPANs. 2015 IEEE International Conference on Communication Workshop (ICCW). 2015. p. 2671–6.
  • Stankovic J. Research directions for the internet of things. Internet of Things Journal, IEEE. 2014; 1:3–9.
  • Shah PG, Xu H, Sharma D. Analytical Study of Implementation Issues of Elliptical Curve Cryptography for Wireless Sensor networks. 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops (WAINA). 2010. p. 589–92.
  • Bhattacharyya A, Bose T, Bandyopadhyay S, Ukil A, Pal A. LESS: Lightweight Establishment of Secure Session: A Cross-Layer Approach Using CoAP and DTLS-PSK Channel Encryption. 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA). 2015. p. 682–7.
  • Schurgot MR, Shinberg DA, Greenwald LG. Experiments with security and privacy in IoT networks. 2015 IEEE 16th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM). 2015; 1–6.
  • Vucinic M, Tourancheau B, Rousseau F, Duda A, Damon L, Guizzetti R. OSCAR: Object security architecture for the Internet of Things. 2014 IEEE 15th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM). 2014; 1–10.
  • Bartoli A, Hernandez‐Serrano J, Leon O, Kountouris A, Barthel D. Energy‐efficient physical layer packet authenticator for machine‐to‐machine networks. Transactions on Emerging Telecommunications Technologies. 2013; 24:401–12.
  • Nicanfar H, Jokar P, Leung V. Smart grid authentication and key management for unicast and multicast communications. 2011 IEEE PES in Innovative Smart Grid Technologies Asia (ISGT). 2011; 1–8.
  • Li S, Choi K, Chae K. An enhanced measurement transmission scheme for privacy protection in smart grid. 2013 International Conference on Information Networking (ICOIN). 2013. p. 18–23.
  • Garcia-Morchon O, Rietman R, Sharma S, Tolhuizen L, Torre-Arce JL. A comprehensive and lightweight security architecture to secure the IoT throughout the lifecycle of a device based on HIMMO. Algorithms for Sensor Systems, ed: Springer. 2015; 112–28.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.