The Internet of Things (IoT), is a network of devices that are uniquely
identified and has embedded software required to communicate the transient states
and data that are usually used to trigger an actuator. The edge networking devices and
protocols are used to communicate with a cloud server that processes and aggregates
the big data arriving from various devices, performs analytics and aids in business
decisions. IoT has become an integral part of today’s industrial, agriculture, healthcare and smart city revolution. Securing all entities involved in an IoT network is vital as it involves pervasive data collection and dissemination. Current IoT protocols work with IP protocols as backbone, but they are specially designed to operate in
multiple layers and provide security at various layers. This chapter focuses on IoT
protocols that deals with securing an IoT network. The major challenges in securing
an IoT network is lack of standardization at manufacturing level which exposes the
hardware, software and the data to various threats and attacks. The IoT protocols have
to deal with security breaches at the site of the cloud service provider and the security
issues pertaining to data privacy, authentication, authorization and trust management
in a distributed heterogeneous environment. This chapter also elaborates on various
security attacks and the solutions offered by IoT protocols.