A Study on Layer Wise Attacks on Service Oriented Architecture in Internet of Things and Their Defensive Mechanisms

نویسنده

  • A. Vinothini
چکیده

The Internet of Things (IOT) describes a worldwide network of intercommunicating devices. IoT is considered as part of Internet and the future will comprise billions of intelligent and communicating ‘things’. The future of the Internet will consist of heterogeneously connected devices that will further extend the borders of the world with physical entities and virtual components. Internet of Things (IoT) will empower the connected things with new capabilities. In this study, the applications, challenges, service oriented architecture (SoA) are detailed. Firstly, the various applications are discussed, secondly, the challenges of IoT are discussed, and thirdly, service oriented architecture concepts and the attacks on SoA are discussed. Finally the defense mechanisms for SoA layer attacks are summarized and compared. Keywords— IoT Applications and Challenges, Service oriented Architecture (SoA), Attacks in SoA layers, Defense Mechanisms for SoA layer attacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Trust Management Model in the Social Internet of Things

The Internet of Things (IoT) and social networking integration, create a new concept named Social Internet of Things (SIoT) according to which the things are able to autonomously establish social relationships with regard to the owners. Things in SIoT operate according to a service-oriented architecture. There may be misbehaving owners and consequently misbehaving devices that can perform harmf...

متن کامل

A method to increasing the Quality of Service (QoS) in Wireless body area networks by providing a MAC layer Protocol based of Internet of Things

With the development of technology, the use of wireless telecommunication networks for the various affairs is essential. These networks are one of the safest and most widely used networks, for instance, in medical care and remote patient monitoring. What matters is the quality of service in these networks. The purpose of this paper is to increase packet transduction in a wireless body area netw...

متن کامل

A Survey of Anomaly Detection Approaches in Internet of Things

Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...

متن کامل

Interoperable Services on Constrained Devices in the Internet of Things

The Internet of Things (IoT) promises billions of constrained devices connected to the Internet in the near-future. The efficient integration of these massively deployments into service-oriented architectures requires light-weight and highly automated mechanisms for device configuration and setup on all layers of the network stack. In this paper we discuss two open problems. First, the set of e...

متن کامل

Security Architecture of the Internet of Things Oriented to Perceptual Layer

The Internet of Things (IoT) is a ubiquitous Internet-based network. However, the IoT exhibits characteristics that pose considerable risks: inherent openness, heterogeneity, and terminal vulnerability. Thus, a new type of architecture must be established to ensure security. The new architecture should aim to improve the efficiency, reliability, and controllability of the entire security system...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017