The Security Strategies in IoT – A Road Map

Bobby S., AmalRedge G.


The Internet of Things (IoT) is the escalation production of the Computer Science and Communication technology. The phrase IoT was originally proposed to connected objects with RFID technology. Presently, researchers relate IoT with sensors, actuators, GPS devices and Mobile devices. IoT has provided a capable prospect to build powerful industrial systems and applications. Recently large number of IoT applications have been developed and deployed. The significance of the security in the IoT is gradually budding and IoT is one of the most promising network technologies in the new network. This paper is a survey of the basic concept of IoT, background architecture and analyzes the security problems of IoT. And also we provide the requirements of embedded security, the solutions to resist different attacks and the technology for defying rage proofing of the embedded devices by the concept of trusted computing. Addressing this concern is equivalent to addressing the security issue of the hardware platform.


Internet of Things, Security, Architecture, Embedded Security

Full Text:



J. Zheng, D. Simplot-Ryl, C. Bisdikian, and H. Mouftah, “The Internet of Things,” in IEEE Communications Magazine, Volume:49 , Issue: 11, pp:30-31, 2011.E.Fleisch, and F.Mattern, Das Internet der Dinge, Springer, 1 edition, July 2005.

T. Fan and Y. Chen, “A Scheme of Data Management in the Internet of Things,” in 2nd IEEE International Conference on Network Infrastructure and Digital Content, Sept. 2010.

Y. Huang and G. Li, “A Semantic Analysis for Internet of Things,” in International Conference on Intelligent Computation Technology and Automation (ICICTA), May 2010.

WU Gongyi, WU Ying. Introduction to the Internet of things engineering [M]. Beijing: china machine press, 2012.

L. Tan and N. Wang, “Future internet: The internet of things,” in Proc. 3rd Int. Conf. Adv. Comput. Theory Eng. (ICACTE), Chengdu, China, Aug. 20–22, 2010, pp. V5-376–V5-380.

X. Jia, O. Feng, T. Fan, and Q. Lei, “RFID technology and its applications in internet of things (IoT),” in Proc. 2nd IEEE Int. Conf. Consum. Electron., Commun. Netw. (CECNet), Yichang, China, Apr. 21–23, 2012, pp. 1282–1285.

IEC/TR 62443-3-1,” industrial communication networks- network and system security – part 3-1: security technologies for industrial automation and control systems”,2009.

NIST SP800-82, “ Guide to industrial control systems(ICS) security “, june 2011.

ISO/IEC 27002, “Information technology – security techniques – code of practice for information security management”, june 2005.

Enterasys, network access control, March 2010,

Trusted computing group, trusted network connect specifications,

IETF NEA Working group status page,

Mark weiser, “the computer for the twenty first century, “scientific American, pp.94-104, September, 1991.

A. Dix, J. Finlay, G.Abowd, and R.Beale, “Human-computer interaction, “prentice Hall, 3e, 2004.

G.D.Abowd, G.R.Hayes, G.lachello, J.A.Kientz, S.N.Patel, and M.M.Stevens, “prototypes and paratypes: Designing mobile and ubiquitous computing applications,” IEEE Pervasive computing, vol. 4, no. 4, pp.67-73, 2005

Maxim Raya and Jean-pierre hubaux, “The security of vehicular networks,” Technical report, Laboratory for computer communications and applications (LCA), School of computer and communication sciences, EPFL, Switzerland, March 2005.

P.Koopman, “Embedded system security,” IEEE Computer, vol. 37,issue. 7, pp.95-97, 2004.

T.Messerges, E. A. Dabbish, and R.H. Sloan, “Examining smart-card security under the threat of power analysis attacks,” IEEE Trans.computers, vol.51, pp.541-552,May 2002.

M. Abramovici, C.Stroud, and J. Emmert, “On-Line BIST and BIST-Based Diagnosis of FPGA logic blocks,” IEEE trans. On VLSI systems, Vol. 12, No.12, pp. 1284-1294, 2004.

S. Ravi, A. Raghunathan, P. Kocher, and S. Hattangady, “Security in Embedded systems: Design challenges,” ACM Transactions on Embedded computing systems, vol. 3,no. 3, pp.461-491, 2004.


Bar-E1 ,”An introduction to side channel Attacks “ , White paper, Discretix Technologies limited,


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.