Design challenges and security issues in the Internet of Things
The world is rapidly getting connected. Commonplace everyday things are providing and consuming software services exposed by other things and service providers. A mash up of such services extends the reach of the current Internet to potentially resource constrained "Things", constituting w...
Saved in:
Published in | 2015 IEEE Region 10 Symposium pp. 90 - 93 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.05.2015
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The world is rapidly getting connected. Commonplace everyday things are providing and consuming software services exposed by other things and service providers. A mash up of such services extends the reach of the current Internet to potentially resource constrained "Things", constituting what is being referred to as the Internet of Things (IoT). IoT is finding applications in various fields like Smart Cities, Smart Grids, Smart Transportation, e-health and e-governance. The complexity of developing IoT solutions arise from the diversity right from device capability all the way to the business requirements. In this paper we focus primarily on the security issues related to design challenges in IoT applications and present an end-to-end security framework. |
---|---|
AbstractList | The world is rapidly getting connected. Commonplace everyday things are providing and consuming software services exposed by other things and service providers. A mash up of such services extends the reach of the current Internet to potentially resource constrained "Things", constituting what is being referred to as the Internet of Things (IoT). IoT is finding applications in various fields like Smart Cities, Smart Grids, Smart Transportation, e-health and e-governance. The complexity of developing IoT solutions arise from the diversity right from device capability all the way to the business requirements. In this paper we focus primarily on the security issues related to design challenges in IoT applications and present an end-to-end security framework. |
Author | Basu, Subho Shankar Tripathy, Somanath Chowdhury, Atanu Roy |
Author_xml | – sequence: 1 givenname: Subho Shankar surname: Basu fullname: Basu, Subho Shankar email: shankar.mtcs13@iitp.ac.in organization: Dept. of CSE, IIT Patna, Patna, India – sequence: 2 givenname: Somanath surname: Tripathy fullname: Tripathy, Somanath email: som@iitp.ac.in organization: Dept. of CSE, IIT Patna, Patna, India – sequence: 3 givenname: Atanu Roy surname: Chowdhury fullname: Chowdhury, Atanu Roy email: atanu.roychowdhury@altiux.com |
BookMark | eNotjjtPwzAYAI0EAy3MDCz-Awl-xK8JoVJKpdIiEQamyo_PiaXgojgd-u-pBNNJN5xuhi7zIQNCd5TUlBLz0C63H19v7zUjVNRMXKAZbZQxVGkmr9HjM5TUZex7OwyQOyjY5oAL-OOYphNOpRzPLmU89YDXeYIxw4QPEbd9yl25QVfRDgVu_zlHny_LdvFabXar9eJpUyVG9FQZoQP32kR53ogyOCmtZopR4jzximmwyhlPtIgKopJSChaCb3jUjjsi-Bzd_3UTAOx_xvRtx9NeUSlZI_gvzmhFTQ |
CODEN | IEEPAD |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/TENSYMP.2015.25 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 1479917826 9781479917822 |
EndPage | 93 |
ExternalDocumentID | 7166245 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i208t-958d3c89f6201f6db66a827210bc0c728ea7b9c085f7ef766652ddc43f8b3b053 |
IEDL.DBID | RIE |
IngestDate | Thu Jun 29 18:38:13 EDT 2023 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i208t-958d3c89f6201f6db66a827210bc0c728ea7b9c085f7ef766652ddc43f8b3b053 |
PageCount | 4 |
ParticipantIDs | ieee_primary_7166245 |
PublicationCentury | 2000 |
PublicationDate | 20150501 |
PublicationDateYYYYMMDD | 2015-05-01 |
PublicationDate_xml | – month: 05 year: 2015 text: 20150501 day: 01 |
PublicationDecade | 2010 |
PublicationTitle | 2015 IEEE Region 10 Symposium |
PublicationTitleAbbrev | TENCONSpring |
PublicationYear | 2015 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.7109727 |
Snippet | The world is rapidly getting connected. Commonplace everyday things are providing and consuming software services exposed by other things and service... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 90 |
SubjectTerms | Computer crime Encryption End-to-end (E2E) security Internet of things Internet of Things (IoT) Peer-to-peer computing Protocols Resource constrained devices Security |
Title | Design challenges and security issues in the Internet of Things |
URI | https://ieeexplore.ieee.org/document/7166245 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NSwMxEB3anjyptOI3OXg0293sJps9edCWIrQUbKGeSj6hCLtitxd_vUl2W0U8eAu5JJMwzJvkzTyAO8soUSZJsVKG4ywVFBeMa6xtYnUsEs5CIe10xibL7HlFVx24P9TCGGMC-cxEfhj-8nWldv6pbOiwPSMZ7ULXJW5NrVbbrSeJi-FiNHt5nc49XYsG6esfcikhWoyPYbpfpyGJvEW7Wkbq81cLxv9u5AQG33V5aH6IOKfQMWUfHp4CCQOpvSzKFolSo20rTIfCyW7RpkQO66HmBdDUqLKo0ewcwHI8WjxOcCuLgDck5jUuKNep4oVlzlLLtGRMcOIyuViqWOWEG5HLQjksZXNjc5efUKK1ylLLZSqd051Br6xKcw6IxDpxfmccCmIZ9Wgvsb6FXC4EzRxWuYC-N3793nS-WLd2X_49fQVH_uwbOuA19OqPnblxIbuWt-GuvgAuPZfR |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LTwIxEJ4gHvSkBoxve_BoYV_tdk8eFILKEhIhwRPpMyEmi5Hl4q-37S5ojAdvTS_tdNLM1-k38wHcGEoiqcMYS6kZTmJOcEaZwsqERgU8ZNQX0uYjOpgmTzMya8DtthZGa-3JZ7rjhv4vXy3l2qXKuhbb0yghO7Br4z4Jq2qtul9PGGTdSW_08pqPHWGLePHrH4IpPl70DyDfrFTRRN4661J05OevJoz_3cohtL8r89B4G3OOoKGLFtw9eBoGkhthlBXihUKrWpoO-bNdoUWBLNpDVQ5Ql2hpUKXa2YZpvze5H-BaGAEvooCVOCNMxZJlhlpLDVWCUs4i-5YLhAxkGjHNU5FJi6ZMqk1qXygkUkomsWEiFvbaHUOzWBb6BFAUqNDePG1xEE2Iw3uhcU3kUs5JYtHKKbSc8fP3qvfFvLb77O_pa9gbTPLhfPg4ej6HfeeHihx4Ac3yY60vbQAvxZX32xdNE5sa |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2015+IEEE+Region+10+Symposium&rft.atitle=Design+challenges+and+security+issues+in+the+Internet+of+Things&rft.au=Basu%2C+Subho+Shankar&rft.au=Tripathy%2C+Somanath&rft.au=Chowdhury%2C+Atanu+Roy&rft.date=2015-05-01&rft.pub=IEEE&rft.spage=90&rft.epage=93&rft_id=info:doi/10.1109%2FTENSYMP.2015.25&rft.externalDocID=7166245 |