The Security Mechanism for Internet of Things Networks


Article Preview

In recent years, with advances in microelectronics technology and Internet of Things technology which promote the rapid development of low power, low price, multifunction sensor, and it also contributed to the development of Internet of Things. Internet of Things can used in military, medical, commercial areas. Characteristics of Internet of Things, this paper mainly described the security threats in the communication process, and analyze its security needs and to take security mechanisms to ensure the security of wireless communications



Edited by:

Zhengyi Jiang, Yugui Li, Xiaoping Zhang, Jianmei Wang and Wenquan Sun




Z. H. Hu and W. L. Chen, "The Security Mechanism for Internet of Things Networks", Applied Mechanics and Materials, Vols. 220-223, pp. 3003-3009, 2012

Online since:

November 2012




[1] Gershenfeld N, Krikorian R, Cohen D. The Internet of things[J]. Scientific American. 2004, 291(04); 76-81.


[2] Pierre de Leusse, Panos Periorellis, Theo Dimitrakos, Srijith K. Nair. Self Managed Security Cell, a securitymodel for the Internet of Th ings and Services[C]. 2009 First International Conference on Advances in Future Internet, 2009: 47-52.


[3] ROMAN R, ALCARAZ C. Applicability of public key infrastructures in wireless sensor networks[J]. Lecture Notes in Computer Science, 2007, 4582: 313-320.


[4] MAINWARING A, POLASTRE J, SZEWCZYK R, et al. Wireless sensor netwo rks for habitat monitoring[C] . ACM international wor kshop on wireless sensor networks and applications, (2002).


[5] ZH U S, SETIA S, JAJODIA S. LEAP: efficient secur ity mechanisms for large scale dist ributed sensor networks [ C ] . In the 10th ACM Conference on Computer and Communications Security ( CCS 03) , 2003: 62-72.


[6] SAVVIDES A, H AN C C, SRIVAST AVA M B. Dynamic fineg rained localization in adhoc netw orks of sensors [ C] . Rome : In Proceeding s of MobiCom2001, 2001: 16-21.

[8] Ganame A K, Bourgeois J, Bidou R, Spies F. A global security architecture for intrusion detectionon computer networks[J]. Computers & Security, March 2008, 27: 30-47.


[9] FINKENZELLE R K. RFID handbook: radio frequency identification fundamentals and applications [ M ] . John Wiley and Sons, 2003: 187- 193.

[10] AIBERTO LG, INDRA W. Communication network s fundament al concept s and key architectures [ M ] . New York: McGraw Hill, 1999: 354- 365.