Design challenges and security issues in the Internet of Things

The world is rapidly getting connected. Commonplace everyday things are providing and consuming software services exposed by other things and service providers. A mash up of such services extends the reach of the current Internet to potentially resource constrained "Things", constituting w...

Full description

Saved in:
Bibliographic Details
Published in2015 IEEE Region 10 Symposium pp. 90 - 93
Main Authors Basu, Subho Shankar, Tripathy, Somanath, Chowdhury, Atanu Roy
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.05.2015
Subjects
Online AccessGet full text

Cover

Loading…
Abstract The world is rapidly getting connected. Commonplace everyday things are providing and consuming software services exposed by other things and service providers. A mash up of such services extends the reach of the current Internet to potentially resource constrained "Things", constituting what is being referred to as the Internet of Things (IoT). IoT is finding applications in various fields like Smart Cities, Smart Grids, Smart Transportation, e-health and e-governance. The complexity of developing IoT solutions arise from the diversity right from device capability all the way to the business requirements. In this paper we focus primarily on the security issues related to design challenges in IoT applications and present an end-to-end security framework.
AbstractList The world is rapidly getting connected. Commonplace everyday things are providing and consuming software services exposed by other things and service providers. A mash up of such services extends the reach of the current Internet to potentially resource constrained "Things", constituting what is being referred to as the Internet of Things (IoT). IoT is finding applications in various fields like Smart Cities, Smart Grids, Smart Transportation, e-health and e-governance. The complexity of developing IoT solutions arise from the diversity right from device capability all the way to the business requirements. In this paper we focus primarily on the security issues related to design challenges in IoT applications and present an end-to-end security framework.
Author Basu, Subho Shankar
Tripathy, Somanath
Chowdhury, Atanu Roy
Author_xml – sequence: 1
  givenname: Subho Shankar
  surname: Basu
  fullname: Basu, Subho Shankar
  email: shankar.mtcs13@iitp.ac.in
  organization: Dept. of CSE, IIT Patna, Patna, India
– sequence: 2
  givenname: Somanath
  surname: Tripathy
  fullname: Tripathy, Somanath
  email: som@iitp.ac.in
  organization: Dept. of CSE, IIT Patna, Patna, India
– sequence: 3
  givenname: Atanu Roy
  surname: Chowdhury
  fullname: Chowdhury, Atanu Roy
  email: atanu.roychowdhury@altiux.com
BookMark eNotjjtPwzAYAI0EAy3MDCz-Awl-xK8JoVJKpdIiEQamyo_PiaXgojgd-u-pBNNJN5xuhi7zIQNCd5TUlBLz0C63H19v7zUjVNRMXKAZbZQxVGkmr9HjM5TUZex7OwyQOyjY5oAL-OOYphNOpRzPLmU89YDXeYIxw4QPEbd9yl25QVfRDgVu_zlHny_LdvFabXar9eJpUyVG9FQZoQP32kR53ogyOCmtZopR4jzximmwyhlPtIgKopJSChaCb3jUjjsi-Bzd_3UTAOx_xvRtx9NeUSlZI_gvzmhFTQ
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/TENSYMP.2015.25
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1479917826
9781479917822
EndPage 93
ExternalDocumentID 7166245
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i208t-958d3c89f6201f6db66a827210bc0c728ea7b9c085f7ef766652ddc43f8b3b053
IEDL.DBID RIE
IngestDate Thu Jun 29 18:38:13 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i208t-958d3c89f6201f6db66a827210bc0c728ea7b9c085f7ef766652ddc43f8b3b053
PageCount 4
ParticipantIDs ieee_primary_7166245
PublicationCentury 2000
PublicationDate 20150501
PublicationDateYYYYMMDD 2015-05-01
PublicationDate_xml – month: 05
  year: 2015
  text: 20150501
  day: 01
PublicationDecade 2010
PublicationTitle 2015 IEEE Region 10 Symposium
PublicationTitleAbbrev TENCONSpring
PublicationYear 2015
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.7109727
Snippet The world is rapidly getting connected. Commonplace everyday things are providing and consuming software services exposed by other things and service...
SourceID ieee
SourceType Publisher
StartPage 90
SubjectTerms Computer crime
Encryption
End-to-end (E2E) security
Internet of things
Internet of Things (IoT)
Peer-to-peer computing
Protocols
Resource constrained devices
Security
Title Design challenges and security issues in the Internet of Things
URI https://ieeexplore.ieee.org/document/7166245
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NSwMxEB3anjyptOI3OXg0293sJps9edCWIrQUbKGeSj6hCLtitxd_vUl2W0U8eAu5JJMwzJvkzTyAO8soUSZJsVKG4ywVFBeMa6xtYnUsEs5CIe10xibL7HlFVx24P9TCGGMC-cxEfhj-8nWldv6pbOiwPSMZ7ULXJW5NrVbbrSeJi-FiNHt5nc49XYsG6esfcikhWoyPYbpfpyGJvEW7Wkbq81cLxv9u5AQG33V5aH6IOKfQMWUfHp4CCQOpvSzKFolSo20rTIfCyW7RpkQO66HmBdDUqLKo0ewcwHI8WjxOcCuLgDck5jUuKNep4oVlzlLLtGRMcOIyuViqWOWEG5HLQjksZXNjc5efUKK1ylLLZSqd051Br6xKcw6IxDpxfmccCmIZ9Wgvsb6FXC4EzRxWuYC-N3793nS-WLd2X_49fQVH_uwbOuA19OqPnblxIbuWt-GuvgAuPZfR
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LTwIxEJ4gHvSkBoxve_BoYV_tdk8eFILKEhIhwRPpMyEmi5Hl4q-37S5ojAdvTS_tdNLM1-k38wHcGEoiqcMYS6kZTmJOcEaZwsqERgU8ZNQX0uYjOpgmTzMya8DtthZGa-3JZ7rjhv4vXy3l2qXKuhbb0yghO7Br4z4Jq2qtul9PGGTdSW_08pqPHWGLePHrH4IpPl70DyDfrFTRRN4661J05OevJoz_3cohtL8r89B4G3OOoKGLFtw9eBoGkhthlBXihUKrWpoO-bNdoUWBLNpDVQ5Ql2hpUKXa2YZpvze5H-BaGAEvooCVOCNMxZJlhlpLDVWCUs4i-5YLhAxkGjHNU5FJi6ZMqk1qXygkUkomsWEiFvbaHUOzWBb6BFAUqNDePG1xEE2Iw3uhcU3kUs5JYtHKKbSc8fP3qvfFvLb77O_pa9gbTPLhfPg4ej6HfeeHihx4Ac3yY60vbQAvxZX32xdNE5sa
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2015+IEEE+Region+10+Symposium&rft.atitle=Design+challenges+and+security+issues+in+the+Internet+of+Things&rft.au=Basu%2C+Subho+Shankar&rft.au=Tripathy%2C+Somanath&rft.au=Chowdhury%2C+Atanu+Roy&rft.date=2015-05-01&rft.pub=IEEE&rft.spage=90&rft.epage=93&rft_id=info:doi/10.1109%2FTENSYMP.2015.25&rft.externalDocID=7166245