The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Background: Internet of Things (IoT) has the potential for societal, environmental as well as economic impact. This comes with a huge responsibility, that of securing all the communications, data and participating things. Method: Surveys and comparative studies are used for understanding the security in IoT. Findings: This paper surveys the IoT at the architectural and protocol stack level. We outline an effective architectural and stack level restructuring. The integration issues at the IPv6 enabled Low Power Wireless Personal Area Network (6LoWPAN) layer along with the security challenges and existing solutions are discussed and summarized under the chosen parameters. These parameters are Privacy, Authentication, Confidentiality, Denial of Service (DOS) Protect, Replay Protect, Impersonate Protect, End-to-End(E2E) Security.

Keywords

Internet of Things, 6LoWPAN, Security.
User