Review of Networking and Tangible Security Techniques for Domestic IoT Devices and Initial Ideas
Zakhary, Sameh; Sunil, Neelima; Mcauley, Derek
NEELIMA SAILAJA Neelima.Sailaja@nottingham.ac.uk
Transitional Assistant Professor
DEREK MCAULEY DEREK.MCAULEY@NOTTINGHAM.AC.UK
Professor of Digital Economy
The number of connected devices including Internet of Things (IoTs) on the Internet is growing fast. According to recent Gartner research, the estimated number of IoT devices is 5.8 billion in 2020 (Gartner, 2019). The countries that are leading the way to IoT deployment include North America, Western Europe and China (Kandaswamy and Furlonger, 2018). By 2024, the number of Machine-2-Machine (M2M) connections between these devices are expected to reach 27 billion in 2024 (Kandaswamy and Furlonger, 2018). This growth in M2M connectivity is expected to result from wide range of application areas such as smart cities, smart infrastructure, smart energy among many others (Hassija et al., 2019).
This wide spread of IoTs has sparked significant research interest to understand various implications (Airehrour et al., 2016; Neshenko et al., 2019; Hassija et al., 2019). IoTs enable the integration between many objects in our daily life (Aazam et al., 2016; Alaba et al., 2017) such as sensors, objects, wearable devices and other types of machines. IoT devices are capable of communicating directly with one another and sharing data without direct human intervention (Crabtree et al., 2018). These “things” could be any traditional objects such as home appliance (e.g. microwave, fridge) or tiny sensor (e.g. humidity or health sensors). The devices are capable of constant collections of various sensitive and personal data about many aspect of our lives due to its pervasive deployment (Ren et al., 2019).
This paper provides an overview of the literature relating to securing IoT with an emphasis on usability from a user perspective as well as approaches to securing access to these devices over the Internet. Although IoT deployment occurs in various settings, i.e. industrial IoT deployment, we mainly focus in this paper on private residential home deployment (i.e. consumer IoTs). We assume that in such settings, users are mostly not experts in security IoT or the underlying networking principles.
This paper is organized as follows: section II discusses various protocols and networking security tools (e.g. firewall and Virtual Private Network (VPN)). Section II-D discusses various approaches to simplify cyber-security by using user-centred approaches. In section III, we present a number of existing including enterprise-grade solutions that could be adopted to secure remote access to IoT devices in domestic settings.
Zakhary, S., Sunil, N., & Mcauley, D. Review of Networking and Tangible Security Techniques for Domestic IoT Devices and Initial Ideas
|Deposit Date||Oct 20, 2020|
|Publicly Available Date||Nov 2, 2020|
|Keywords||Home networking, Internet of Thing, Tangable security, Public/private key security, Usability|
|Related Public URLs||https://doi.org/10.17639/25QK-BX48|