A Survey on Wireless Sensors Networks Security Based on a Layered Approach [chapter]

Raul A. Fuentes-Samaniego, Ana Rosa Cavalli, Juan A. Nolazco-Flores, Javier Baliosian
2015 Lecture Notes in Computer Science  
The Internet of Things (IoT) is one of the most novel networking paradigms and there are yet too many technologies defining themselves as IoT complicating the scenario for developing a fully IoT environment. The situation becomes even harder when security and privacy are considered. In this paper, we present a survey on the security aspects of an IoT conformed by wireless sensors communicating through the IEEE 802.15.4 standard. This survey follows a revision of the state of art in a
more » ... yer systematic analysis. Keywords: IoT WSN 6LoWPAN CoAP 802.15.4 Discussion Although IoT implementations have been appearing since 2001, almost all the work has been made on proprietary protocols, which need special devices for translating from the WSN network to the Internet. The protocols listed in this survey are relatively new, 6LoW-PAN was first announced in 2009 and products supporting it began to appear since 2012. Something similar occurs with the ReST protocols, such as CoAP that is still a draft. EXI is from 2007, but it was not designed for the IoT. Therefore, more work for testing the performance of all those protocols combined is needed. In the Fig. 5 is shown a generic model for the IoT environment. The clients have IPv6 or IPv4, and they request the data using a typical HTTP/S communication meanwhile the sensors communicate using CoAP, 6LoWPAN and the 802.15.4 standard. As all the communication and operations occur over the Internet, all the inherited security concerns need to be taken into consideration, such as the ones related to HTTP.
doi:10.1007/978-3-319-22572-2_6 fatcat:oei4aig6wvbehknxny2x33zhfi