**3.3 Security and privacy issues**

The implementation of protocols with constrained networks should be dealt with some open problems. It is induced and related to the nature and feature of the physical devices. The features are included a limited computational capacity, a low amount of memory, and a limitation on energy computation, it makes the design of these protocols too hard and complicated in nature. We give some requirements and summarize for security and privacy issues related to IoT services as follows [29–30].

	- Access to sensors, devices and objects.
	- Where the IoT network is located and inter-connected.
	- What kind of data is generated and communicated.
	- Whether the data which is produced is in active or at rest.
	- A measured temperature is moderate to devices and sensors.
	- Different secure complexity and level in each devices and objects.
	- Suitable gateway system for multi-function is available.
	- Complex and large system is needed to guarantee and protect the attack model

*Analyses of Open Security Issues for Smart Home and Sensor Network Based on Internet… DOI: http://dx.doi.org/10.5772/intechopen.97851*

	- Devices are small and scale down.
	- Resources cannot be intensive and compact.
	- A numbers of devices are required.
	- Performance should be considered.
	- Comprehensibility, manageability and availabilities.
	- Different risk profiles are induced.
	- One size does not fit all and complex and complicated techniques are necessary.
	- Adaptation and extensible platform can be utilized.
	- Rapid customization using adaptors can be easy implemented.
	- Multi-vendor with different standards & protocols can support.
	- Common gateway platform is essential and vital in secure.
	- Proxy system for device management can be used.
	- Gateway is made up with data and control channels, configuration, status monitoring, and device registration and inventory, etc.
	- Security and access control is embedded in gateway engine.

One of the major problems related with IoT is the heterogeneous nature of devices. Shachar Siboni et al. analyzed several specific IoT testing scenarios based on different IoT devices [31]. Daewon Kim et al. present common security requirement for IoT device identification system. The requirements are more important when the identification information is used as the sensitive data such as authentication [32]. Franco Loi et al. developed a systematic and optimized method to identify and evaluate the security and privacy on various IoT devices. They categorize the threats along four dimensions such as confidentiality, integrity, access control and reflective attacks [33].
