Author_Institution :
Sch. of Comput. Eng. & Math., Univ. of Western Sydney, Sydney, NSW, Australia
Abstract :
The Internet of Things (IoT) was of a vision in which all physical objects are tagged and uniquely identified using RFID transponders or readers. Nowadays, research into the IoT has extended this vision to the connectivity of Things to anything, anyone, anywhere and at anytime. The IoT has grown into multiple dimensions, which encompasses various networks of applications, computers, devices, as well as physical and virtual objects, referred to as things or objects, that are interconnected together using communication technologies such as, wireless, wired and mobile networks, RFID, Bluetooth, GPS systems, and other evolving technologies. This paradigm is a major shift from an essentially computer-based network model to a fully distributed network of smart objects. This change poses serious challenges in terms of architecture, connectivity, efficiency, security and provision of services among many others. This paper studies the state-of-the art of the IoT. In addition, some major security and privacy issues are described and a new attack vector is introduced, referred to as the “automated invasion attack”.
Keywords :
Global Positioning System; Internet of Things; computer network security; data privacy; mobile radio; radiofrequency identification; transponders; Bluetooth; GPS system; Internet of Things; IoT; RFID; RFID transponders; automated invasion attack; communication technology; computer-based network model; distributed network; mobile networks; privacy issue; security issue; smart objects; wired network; wireless network; Internet; Mobile communication; Object recognition; Privacy; Security; Sensors; Wireless sensor networks; Internet of Things; RFID; Smart Objects; Ubiquitous Computing;