Skip to main content

Research Repository

Advanced Search

The Internet of Things: a security point of view.

Li, Shancang; Tryfonas, Theo; Li, Honglei


Shancang Li

Theo Tryfonas

Honglei Li


Professor Pan Wang, Professor Sohail Chaudhry


-- To provide an in-depth overview of the security requirements and challenges for Internet of Things (IoT) and discuss security solutions for various enabling technologies and implications to various applications.
-- Security requirements and solutions are analyzed based on a four-layer framework of IoT on sensing layer, network layer, service layer, and application layer. The cross-layer threats are analyzed followed by the security discussion for the enabling technologies including identification and tracking technologies, WSN and RFID, communication, networks, and service management.
-- IoT calls for new security infrastructure based on the new technical standards. As a consequence, new security design for IoT shall pay attention to these new standards. Security at both the physical devices and service-applications is critical to the operation of IoT, which is indispensable for the success of IoT. Open problems remain in a number of areas, such as security and privacy protection, network protocols, standardisation, identity management, trusted architecture, etc.
Practical implications
-- The implications to various applications including SCADA, enterprise systems, social IoT are discussed. The paper will serve as a starting point for future IoT security design and management. The security strategies for IoT should be carefully designed by managing the trade-offs among security, privacy, and utility to provide security in multi-layer architecture of IoT.
-- The paper synthesizes the current security requirements for IoT and provides a clear framework of security infrastructure based on four layers. Accordingly, the security requirements and potential threats in the four-layer architecture are provided in terms of general devices security, communication security, network security, and application security.

Journal Article Type Article
Acceptance Date Aug 30, 2015
Publication Date Apr 4, 2016
Deposit Date Oct 12, 2015
Publicly Available Date May 15, 2017
Print ISSN 1066-2243
Publisher Emerald
Peer Reviewed Peer Reviewed
Volume 26
Issue 2
Pages 337-359
Keywords Communication security; information security; network security; applications security
Public URL
Contract Date May 15, 2017


Downloadable Citations