-
Technical Analysis of Security Infrastructure in RFID Technology
Authors:
Tuhin Borgohain,
Sugata Sanyal
Abstract:
The paper is a technical analysis of the security infrastructure in the field of RFID technology. The paper briefly discusses the architecture of the RFID technology. Then it analyses the various features and advantages RFID technology has over the existing technologies like bar codes. This is followed by a discussion of the various disadvantages and security drawbacks of RFID technology that prev…
▽ More
The paper is a technical analysis of the security infrastructure in the field of RFID technology. The paper briefly discusses the architecture of the RFID technology. Then it analyses the various features and advantages RFID technology has over the existing technologies like bar codes. This is followed by a discussion of the various disadvantages and security drawbacks of RFID technology that prevents its widespread adoption in the mainstream market. The paper concludes with a brief analysis of some of the security measures that are implemented within the RFID technology for securing up the whole infrastructure. The main aim of the paper is to focus on the drawbacks of the pre-existing security measures in RFID technology as well as to discuss the direction in which further research has to be carried out without the compromise on its unique features.
△ Less
Submitted 1 May, 2015;
originally announced May 2015.
-
Comparative Analysis of Cryptography Library in IoT
Authors:
Uday Kumar,
Tuhin Borgohain,
Sugata Sanyal
Abstract:
The paper aims to do a survey along with a comparative analysis of the various cryptography libraries that are applicable in the field of Internet of Things (IoT). The first half of the paper briefly introduces the various cryptography libraries available in the field of cryptography along with a list of all the algorithms contained within the libraries. The second half of the paper deals with cry…
▽ More
The paper aims to do a survey along with a comparative analysis of the various cryptography libraries that are applicable in the field of Internet of Things (IoT). The first half of the paper briefly introduces the various cryptography libraries available in the field of cryptography along with a list of all the algorithms contained within the libraries. The second half of the paper deals with cryptography libraries specifically aimed for application in the field of Internet of Things. The various libraries and their performance analysis listed down in this paper are consolidated from various sources with the aim of providing a single comprehensive repository for reference to the various cryptography libraries and the comparative analysis of their features in IoT.
△ Less
Submitted 16 April, 2015;
originally announced April 2015.
-
Survey of Operating Systems for the IoT Environment
Authors:
Tuhin Borgohain,
Uday Kumar,
Sugata Sanyal
Abstract:
This paper is a comprehensive survey of the various operating systems available for the Internet of Things environment. At first the paper introduces the various aspects of the operating systems designed for the IoT environment where resource constraint poses a huge problem for the operation of the general OS designed for the various computing devices. The latter part of the paper describes the va…
▽ More
This paper is a comprehensive survey of the various operating systems available for the Internet of Things environment. At first the paper introduces the various aspects of the operating systems designed for the IoT environment where resource constraint poses a huge problem for the operation of the general OS designed for the various computing devices. The latter part of the paper describes the various OS available for the resource constraint IoT environment along with the various platforms each OS supports, the software development kits available for the development of applications in the respective OS along with the various protocols implemented in these OS for the purpose of communication and networking.
△ Less
Submitted 13 April, 2015; v1 submitted 9 April, 2015;
originally announced April 2015.
-
Authentication Systems in Internet of Things
Authors:
Tuhin Borgohain,
Amardeep Borgohain,
Uday Kumar,
Sugata Sanyal
Abstract:
This paper analyses the various authentication systems implemented for enhanced security and private re-position of an individual's log-in credentials. The first part of the paper describes the multi-factor authentication (MFA) systems, which, though not applicable to the field of Internet of Things, provides great security to a user's credentials. MFA is followed by a brief description of the wor…
▽ More
This paper analyses the various authentication systems implemented for enhanced security and private re-position of an individual's log-in credentials. The first part of the paper describes the multi-factor authentication (MFA) systems, which, though not applicable to the field of Internet of Things, provides great security to a user's credentials. MFA is followed by a brief description of the working mechanism of interaction of third party clients with private resources over the OAuth protocol framework and a study of the delegation based authentication system in IP-based IoT.
△ Less
Submitted 3 February, 2015;
originally announced February 2015.
-
Survey of Security and Privacy Issues of Internet of Things
Authors:
Tuhin Borgohain,
Uday Kumar,
Sugata Sanyal
Abstract:
This paper is a general survey of all the security issues existing in the Internet of Things (IoT) along with an analysis of the privacy issues that an end-user may face as a consequence of the spread of IoT. The majority of the survey is focused on the security loopholes arising out of the information exchange technologies used in Internet of Things. No countermeasure to the security drawbacks ha…
▽ More
This paper is a general survey of all the security issues existing in the Internet of Things (IoT) along with an analysis of the privacy issues that an end-user may face as a consequence of the spread of IoT. The majority of the survey is focused on the security loopholes arising out of the information exchange technologies used in Internet of Things. No countermeasure to the security drawbacks has been analyzed in the paper.
△ Less
Submitted 9 January, 2015;
originally announced January 2015.
-
Multipath Routing of Fragmented Data Transfer in a Smart Grid Environment
Authors:
Tuhin Borgohain,
Amardeep Borgohain,
Rajdeep Borgohain,
Sugata Sanyal
Abstract:
The purpose of this paper is to do a general survey on the existing communication modes inside a smart grid, the existing security loopholes and their countermeasures. Then we suggest a detailed countermeasure, building upon the Jigsaw based secure data transfer [8] for enhanced security of the data flow inside the communication system of a smart grid. The paper has been written without the consid…
▽ More
The purpose of this paper is to do a general survey on the existing communication modes inside a smart grid, the existing security loopholes and their countermeasures. Then we suggest a detailed countermeasure, building upon the Jigsaw based secure data transfer [8] for enhanced security of the data flow inside the communication system of a smart grid. The paper has been written without the consideration of any factor of inoperability between the various security techniques inside a smart grid
△ Less
Submitted 31 December, 2014;
originally announced January 2015.