Analysis and Research on Secure Architecture in the Internet of Things

Article Preview

Abstract:

The Internet of things is the technology extension and expansion of computer, Internet and mobile communication network. We will strongly rely on the Internet of Things in the future. The Internet of Things provides more conveniences, but it also will face more threats. In this article, we describe architecture of the Internet of Things, the function of every layer and what components every layer need. Our emphasis is to analyze the threats for the security and privacy at different levels of architecture in the Internet of Things.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2205-2209

Citation:

Online since:

November 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Stefan Poslad, Mohamed Hamdi, Habtamu Abie. International Workshop on Adaptive Security & Privacy management for the Internet of Things (ASPI 2013). UbiComp'13, September 8–12, 2013, Zurich, Switzerland.

DOI: 10.1145/2494091.2499770

Google Scholar

[2] Kopertz. h. 2011. Internet of Things. Ch. In Real-Time Systems: Design Principles for Distributed Embedded Applications. 2 nd Edition. Springer Verlag 2011, 307-323. DOI: 10. 1007/978-1-4419-8237-7_13.

Google Scholar

[3] Wu, G, Talwar, s., Johnsson, K, Himayat, N., and Johnson K.D. 2011. Recent Progress in Machine-to-Machine communications, IEEE communication magazine. Apr. 2011, 36-43.

DOI: 10.1109/mcom.2011.5741144

Google Scholar

[4] Denis Kozlov, Jari Veijalainen, Yasir Ali. Security and Privacy Threats in IoT Architectures. Proceedings of the 7th International Conference on Body Area Networks, 2012, 256-262.

DOI: 10.4108/icst.bodynets.2012.250550

Google Scholar

[5] Cole P.H. and Rannasinghe, D.C. (Eds). 2007. Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting, Springer Verlag.

Google Scholar

[6] Molina-markham, A., Shenoy,P., Fu, K., Cecchet, E., Irwin D. 2010. Private Memoirs of a Smart Meter. Proc. of Buildsys 201061-66. Doi: 10. 1145/1878446.

DOI: 10.1145/1878431.1878446

Google Scholar

[7] Bao,F., H. and Wang,G. 2009. Information Security Practice and Experience. In Proceedings of the 5 th International conference IPSEC 2009, Xi'an, China, 13-15.

Google Scholar

[8] Ouyang,Y., Le,Z., Liu,D., Ford J., and Makedon, F. 2008. Source Location Privacy against Laptop-Class Attacks in Sensor Networks. In proceedings of the 4 th international conference on security and privacy in communication networks, 5, (Istanbu, 2008), ACM New York, available at http: /dl. acm. org/citation. cfm?doid=1460877. 1460884.

DOI: 10.1145/1460877.1460884

Google Scholar

[9] Bonaci,T., Bushnell,L., Poovendran, R. 2010. Node Capture Attacks in Wireless Sensor Networks: A System Theoretic approach. In Proceedings of the 13th International Conference on Network-Based Information Systems, IEEE Computer Society Press.

DOI: 10.1109/cdc.2010.5717499

Google Scholar

[10] Weber R H. Internet of Things-New Security and Privacy Challenges[J], Computer Law & Security Review, 2010, 26(1): 23-30.

DOI: 10.1016/j.clsr.2009.11.008

Google Scholar

[11] Leusse P, PerioreIIiP, Dimitrakos T. Self managed Security Cell, a Security Model for the Internet of Things and Service[C]. Proceeding of the 1st International Conference on Adavances in Future Internent, 2009, 2: 47-52.

DOI: 10.1109/afin.2009.15

Google Scholar