The myriad of technologies and protocols working at different layers pose significant security challenges in the upcoming Internet of Things (IoT) paradigm. Security features and needs vary from application to application and it is layer specific. In addition, security has to consider the constraints imposed by energy limited sensor nodes and consider the specific target application in order to provide security at different layers. This paper analyses current standardization efforts and protocols. It proposes a generic secured network topology for IoT and describes the relevant security challenges. Some exploitation examples are also provided.
|Title of host publication||Irish Signals & Systems Conference 2014 and 2014 China-Ireland International Conference on Information and Communications Technologies (ISSC 2014/CIICT 2014). 25th IET|
|Number of pages||6|
|Publication status||Published - 2014|
|Event||IET ISSC'14- 25th IET Irish Signals and Systems Conference 2014 - Limerick, Ireland|
Duration: 26 Jun 2013 → 27 Jun 3013
|Conference||IET ISSC'14- 25th IET Irish Signals and Systems Conference 2014|
|Period||26/06/2013 → 27/06/3013|