Internet of things is a popular technology which is growing at a faster pace day by day. the internet of things (IoT) describes physical objects (or groups of such objects) that are embedded with sensors, processing ability, software, and other technologies that connect and exchange data with other devices and systems over the internet or other communications networks. the important concerns in the data security of IoT applications are insecure communications and data storage. one of the significant challenges for IoT security is that compromised devices can be used to access confidential data. cryptography is an efficient way to deal with this challenge. encryption is a fundamental form of defense that deals with security of the data itself. this means that even in the event of a system breach, compromised data is still only readable by authorized users in possession of the right encryption keys. it's an efficient solution against eavesdropping attacks (used in industrial espionage), also known as sniffing attacks, when the cybercriminal passively accesses data as it is being sent or received on the network. cryptography is also a good defense against active eavesdropping (aka man-in-the-middle attack) in which the hacker intercepts all relevant messages and injects new ones between two devices. this paper contains of comparison of various models and framework & algorithms used in earlier research with respect to IoT security issues. our future proceedings can be in the direction to develop a novel approach to ensure security for IoT using efficient cryptographic algorithms.

1.
Jyoti
Deogirikar
,
Amar sinh
Vidhate
(IoT in Social, Mobile, Analytics and Cloud) (I-SMAC 2017) 978-1-5090-3243-3/17/$31.00©2017 IEEE34
2.
Arbab Waseem
Abbas
;
Safdar Nawaz Khan
Marwat
;
Salman
Ahmed
;
Abdul
Hafeez
;
Khalil
Ullah
;
Ihsan
Ullah Khan
, “
Proposing Model for Security of IoT Devices in Smart Logistics: A Review
2020
3rd
InternationalConference on Computing, Mathematics and Engineering Technologies (iCoMET
)
3.
S.
Kaviya
et. al,; “
Ensures the securities in IoT for smart home monitoring system
”,
International Journal of Advance Research, ideas and Innovations in Technology
4.
Himanshu
Gupta
, et. al; “
A security Framework for IoT Devices Against Wireless Threats
”,
2017
2nd International conference on Tele communication and Networks (TEL-NET2017
)
5.
Ronald
Jabangwe
, et. al, “
SIoT Framework: Towards an approach for Early Identification of security Requirements for Internet-of-things Applications
”,
e-information Software Engineering Journal
, Volume
14
, issue1,
2020
6.
Rahul
Agrawal
, et, al, “
Continuous Security in IOT using Block chain
” ICASSP2018.
7.
S.N
Uke
,
A.R
Mahajan
,
R.C
Thool
UML Modeling of Physical and Data Link Layer Security Attacks in WSN
”,
International Journal of Computer Applications
, Volume
70
–No.
11
, May
2013
.
8.
Li
,
Hong
,
Y.
Chen
, and
Z.
He
. "
The Survey of RFID Attacks and Defenses
."
8th International Conferenceon IEEE Wireless Communications, Networking and Mobile Computing (WiCOM
),
2012
.
9.
I.
Andrea
,
C.
Chrysostomou
and
G.
Hadjichristofi
, “
Internet of Things: Security vulnerabilities and challenges
,” 2015
IEEE Symposium on Computers and Communication (ISCC)
, pp.
180
187
, Larnaca,
2015
.
10.
F.
Kandah
,
Y.
Singh
,
W.
Zhang
and
C.
Wang
, “
Mitigating colluding injected attack using monitoring Verification in mobile ad-hoc networks
”,
Security and Communication Networks
, pp.
1939
0122
,
2013
.
11.
M.U.
Farooq
,
M.
Waseem
,
A.
Khairi
,
S.
Mazhar
, “
A Critical Analysis on the Security Concerns of Internet of Things (IoT
)”,
International Journal of Computer Applications
(0975 8887), Volume
111
-No.
7
, February
2015
.
12.
Zulkifli
,
M.
Zaid
W.
Mohd
,“
Attack on Cryptography
”,(
2008
).
13.
Md. I.
Abdullah
,
M. M.
Rahman
and
M. C.
Roy
, “
Detecting Sinkhole Attacks in Wireless Sensor Network using Hop Count
I. J. Computer Network and Information Security
,pp.
50
56
,
2015
.
14.
Jain
,
Pragya
and
Sardana
,
Anjali
,“
Defending against Internet Worms Using Honey farm
Proceedings ofthe CUBE International Information Technology Conference
, pp.
795
800
,
2012
15.
Liu
,
Z.
,
Huang
,
X.
,
Hu
,
Z.
,
Khan
,
M.K.
,
Seo
,
H.
, and
Zhou
,
L.
: ‘
On emerging family of elliptic curves to secure internet of things: ECC comes of age
’,
IEEE Transactions on Dependable and Secure Computing
,
2017
,
14
, (
3
), pp.
237
248
16.
Zhou
,
R.
,
Zhang
,
X.
,
Du
,
X.
,
Wang
,
X.
,
Yang
,
G.
, and
Guizani
,
M.
: ‘
File centric Multi-Key Aggregate Keyword Searchable Encryption for Industrial Internet of Things
,
IEEE Transactions on Industrial Informatics
,
2018
17.
Cheng
,
C.
,
Lu
,
R.
,
Petzoldt
A.
, and
Takagi
,
T.
:
‘Securing the Internet of Things in a quantum world
’,
IEEE Communications Magazine
,
2017
,
55
,(
2
),pp.
116
12
This content is only available via PDF.
Published by AIP Publishing.
You do not currently have access to this content.