Abstract: A direct interpretation of the term Internet of Things refers to the use of standard Internet protocols for the human-to-thing or thing- to-thing communication in embedded networks. Although the security needs are well-recognized in this domain, it is still not fully understood how existing IP security protocols and architectures can be deployed. In this paper, we discuss the applicability and limitations of existing Inter- net protocols and security architectures in the context of the Internet of Things. First, we give an overview of the deployment model and general security needs. We then present challenges and requirements for IP-based security solutions and highlight technical limitations of standard IP security protocols. Focused on the security loopholes arising out of the information exchange technologies used in Internet of Things. No countermeasure to the security drawbacks has been analyzed in the paper.

Keywords: Denial of Service, RFID, WSN, Internet of Things, DDoS Attack, Surveillance, sequestration.