Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Application Layer in Internet of Things: A Review in Protocols and Security Threats


Affiliations
1 Assistant Professor, Department of Computer Science and Engineering, Sri Ramakrishna Institute of Technology, Coimbatore, Tamil Nadu, India
     

   Subscribe/Renew Journal


An Internet of things is an emerging technology are used in wide range of smart applications as smart cities, smart health, smart fitness, smart agriculture, smart home and other applications like institutions and military areas. They are aggregated together many interconnected devices which connects with an internet and various sensors. An IoT architecture is divided into various layers as perception layer, network layer and application layer. Due to wide usage of these smart devices, lack on security takes place and has the possibility of occurring the attacks. In this review paper, deep description on application layer protocols like Constrained Application Protocol (CoAP), Message Queuing Telemetry Transport (MQTT), Advance Message Queuing Protocol (AMQP) and REST (Representational State Transport) etc. and security threats on application layers and its attacks that care classified as web & mobile application and RFID attacks are represented.

Keywords

Application layer, Architecture layers, Internet of Things, Security threats.
Subscription Login to verify subscription
User
Notifications
Font Size


  • S. M. Tahsien, H. Karimipour, and P. Spachos, “Machine learning based solutions for security of Internet of Things (IoT): A survey,” Journal of Network and Computer Applications, vol. 161, Jul. 2020, Art. no. 102630.
  • K. Aarikaa, M. Bouhlal, R. A. Abdelouahid, S. Elfilali, and E. Benlahmar, “Perception layer security in the Internet of Things,” Procedia Computer Science, vol. 175, pp. 591-596, 2020.
  • H. A. Khattak, M. A. Shah, S. Khan, I. Ali, and Muhd. Imran, “Perception layer security in Internet of Things,” Future Generation Computer Systems, 2019.
  • S. Sharma, and H. Sain, “Fog assisted task allocation and secure deduplication using 2FBO and MoWo in cluster-based industrial IoT (IIoT),” Journal of Computer Communications, vol. 152, pp. 187-199, 2020.
  • M. S. S. Rukmini, and Y. U. Devi, “ IoT in connected vehicles: Challenges and issues - A review,” in Proceedings of the IEEE International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), Paralakhemundi, 2016, pp. 1864-1867.
  • U. Tandale, B. Momin, and D. P. Seetharam, “An empirical study of application layer protocols for IoT,” International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS-2017), 2017.
  • J. Ma, H. Yu, Y. Xu, and K. Deng, “CDAM: Conservative data analytical model for dynamic climate information evaluation using intelligent IoT environment - An application perspective,” Journal of Computer Communications, vol. 150, pp. 177-184, 2020.
  • S. Arvind, and V. A. Narayanan, “An overview of security in CoAP: Attack and analysis,” 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS), 2019.
  • R. A. Rahman, and B. Shah, “Security analysis of IoT protocols: A focus in CoAP,” 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC), 2016, pp. 1-7.
  • K. P. Naik, and U. R. Joshi, “Performance analysis of constrained application protocol using Cooja simulator in Contiki OS,” 2017 International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT), 2017, pp. 547-550.
  • P. Sharma, M. Kherajani, D. Jain, and D. Patel, “A study of routing protocols, security issues and attacks in network layer of Internet of Things framework,” 2nd International Conference on Data, Engineering and Applications (IDEA), 2020.
  • H. P. Alahari, and S. B. Yalavarthi, “A survey on network routing protocols in Internet of Things (IOT),” International Journal of Computer Applications, vol. 160, no. 2, Feb. 2017.
  • Internet Users. Accessed: Dec. 14, 2017. [Online]. Available: http://www.Internetlivestats.com/Internet-users/
  • Global Internet Usage. Accessed: Dec. 14, 2017. [Online]. Available: https://www.en.wikipedia.org/wiki/Global_Internet_usage/
  • Muhd. Burhan, R. A. Rehman, B. Khan, and B.-S. Kim, “IoT elements, layered architectures and security issues: A comprehensive survey,” Sensors, vol. 18, no. 9, 2018, Art. no. 2796, doi: 10.3390/s18092796,www.mdpi.com/ journal/sensors.

Abstract Views: 200

PDF Views: 0




  • Application Layer in Internet of Things: A Review in Protocols and Security Threats

Abstract Views: 200  |  PDF Views: 0

Authors

Parvathy K.
Assistant Professor, Department of Computer Science and Engineering, Sri Ramakrishna Institute of Technology, Coimbatore, Tamil Nadu, India

Abstract


An Internet of things is an emerging technology are used in wide range of smart applications as smart cities, smart health, smart fitness, smart agriculture, smart home and other applications like institutions and military areas. They are aggregated together many interconnected devices which connects with an internet and various sensors. An IoT architecture is divided into various layers as perception layer, network layer and application layer. Due to wide usage of these smart devices, lack on security takes place and has the possibility of occurring the attacks. In this review paper, deep description on application layer protocols like Constrained Application Protocol (CoAP), Message Queuing Telemetry Transport (MQTT), Advance Message Queuing Protocol (AMQP) and REST (Representational State Transport) etc. and security threats on application layers and its attacks that care classified as web & mobile application and RFID attacks are represented.

Keywords


Application layer, Architecture layers, Internet of Things, Security threats.

References