International Journal of Computer Engineering and Applications, Volume XI, Issue VII, July 17, www.ijcea.com ISSN 2321-3469 Foram Suthar, Gaurang Raval and Sharada Valiveti 21 SURVEY ON SECURITY PROVISIONS FOR IoT LAYERS Foram Suthar 1 , Gaurang Raval 2 , Sharada Valivet 2 1 Indrashil Institute of Science and Technology, Gujarat, India 2 Institute of Technology, Nirma University, Gujarat, India ABSTRACT: IoT can be defined as new technology for new generation which improves our daily life using some tiny devices, sensor nodes which are connected to each other through Internet. We can easily operate our home appliance using IoT at anytime and anywhere. But the main issue behind IoT based communication is security. Secure communication between all devices is highly important and a mandate in IoT. The purpose of this paper is to explore various security provisions available in different layers of IoT stack. This paper examines various application layer protocol, transport layer protocols and other layer protocols from security point of view. The paper also discusses other related work done in the security domain of IoT. Keywords: IoT, CoAP, DTLS, 6LOWPAN [1] INTRODUCTION Internet of Things is growing at a rapid pace aiming at connecting every possible electronic device using Internet. It works as a standard of Communication Bridge between computer and human, computer and computer as well as machine to machine. Among the many application layer protocols in IoT the most popular and preferable protocol is CoAP (Constrained Application Protocol). CoAP basically serves the purpose of providing almost realtime message exchange service between devices or nodes complying with IoT standard. IoT enables a new type of communication mode that is machine to machine (M2M). The communication can be between any two devices interconnected, may perform certain fixed set of tasks also without human intervention. The medium of communication during such events may be wired or wireless. Interesting example to explain this concept is the synchronization of email account in a mobile device for which the necessary credentials are already stored in the mobile device. As and when any new mail arrives for the specific account the servers push the message to the device and accordingly the notification also pops up on the device about the new mail arrival. The mobile device is tightly synchronized with such sophisticated mail services. Messages are also delivered in a reliable fashion, no messages are dropped. All these activities take place without any human intervention. IoT standards and protocols provide the framework to design interesting applications involving tiny devices and communication networks. An example here can be, on the basis of