Skip to main content

Study on Security Architecture for Internet of Things

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 224))

Abstract

The development of Internet of Things(IoT) will bring a new ubiquitous computing and communication era. Due to the lack of security mechanisms in the early Internet, we had to build patches to improve the security of it, which leads to that the Internet security is always a big risk. To avoid the same thing happened in building IoT, the security of IoT should be systematically studied from the beginning design of the IoT. In this paper, based on the studies on the IoT architecture and the analysis on the secure threats in IoT, the security architecture of the IoT is presented on the basis of the secure architecture of the information system, the related secure problems in the IoT are analyzed from the aspect of the secure service, secure domain and network layer. In addition, the limitation and the hardness work for the future are pointed out in this field.

This work is partially supported by NSFC Grant # 61070207.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Brock, D.L.: The Electronic Product Code (EPC), A Naming Scheme for Physical Objects. MIT AUTO-ID CENTER (2001)

    Google Scholar 

  2. Mayer, C.P.: Security and Privacy Challenges in the Internet of Things. Electronic Communications of the EASST 17, 1–12 (2009)

    Google Scholar 

  3. Sarma, S.E., Weis, S.A., Engels, D.W.: RFID systems and security and privacy implications. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454–469. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  4. Sarma, S.E., Weis, S.A., Engels, D.W.: Radio frequency identification: Secure risks and challenges. RSA Laboratories Cryptobytes 6(1), 2–9 (2003)

    Google Scholar 

  5. Ohkubo, M., Suzuki, K., Kinoshita, S.: Hash-chain based forward secure privacy protection scheme for low-cost RFID. In: Proceedings of the 2004 Symposium on Cryptography and Information Security (SCIS 2004), Sendai, pp. 719–724 (2004)

    Google Scholar 

  6. YunLim: Symmetric encryption in RFID authentication protocol for strong location privacy and forward-security. In: 2006 International Conference on Hybrid Information Technology (ICHIT 2006), vol. 2, pp. 718–723 (November 2006)

    Google Scholar 

  7. Zhou, Y.-b., Feng, D.-g.: Design and analysis of cryptographic protocols for RFID. Chinese Journal of Computers 29(4), 581–589 (2006)

    Google Scholar 

  8. Zhu, S., Satia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-scale Distributed Sensor Networks. In: Proceedings of ACM Conference on computing and Communication Security, pp. 72–72. ACM Press, New York (2003)

    Google Scholar 

  9. Oliveira, L.B., Dahab, R., Lopez, J., et al.: Identity-based encryption for sensor networks. In: Proceedings of 5th Annual IEEE International Conference on Pervasive Computing and Communications Workshops, White Plains, NY, pp. 290–294 (2007)

    Google Scholar 

  10. Jolly, G., Kuscu, M.C., Kokate, P., Younis, M.: A low-energy key management protocol for wireless sensor networks. The 8th IEEE International Symposium on Computers and Communication, ISCC 2003 (June 2003)

    Google Scholar 

  11. Eltoweissy, M., Wadaa, A., Olariu, S., Wilson, L.: Group key management scheme for large-scale wireless sensor network. J. Ad Hoc Networks, 796–802 (September 2005)

    Google Scholar 

  12. Younis, M., Ghumman, K., Eltoweissy, M.: Location-aware combinatorial key management scheme for clustered sensor networks. IEEE Trans. Parallel and Distrib. Sys. (2006)

    Google Scholar 

  13. Eltoweissy, M., Moharrum, M., Mukkamala, R.: Dynamic key management in sensor networks. IEEE Communications Magazine, 122–130 (April 2006)

    Google Scholar 

  14. Wiechert, T., Thiesse, F., Michahelles, F., Schmitt, P., Fleisch, E.: Connecting mobile phones to the Internet of things: A discussion of compatibility issues between EPC and NFC. Presented at the Americas Conf. Inf. Syst. (AMCIS), Keystone, CO (2006)

    Google Scholar 

  15. Li, H., Yang, Y.-x.: Analysis on the Security Threads of TETRA System. Mobile Communications 3(29), 22–25 (2005)

    Google Scholar 

  16. ISO IS 7498-2. Information Processing Systems - Open Systems Interconnection Basic Reference Model-Part: Security Architecture. ISO Geneva, Switzerland (1989)

    Google Scholar 

  17. Department of Defense. Trusted Computer System Evaluation Criteria. Standard 5200.28-STD. (December 1985)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, H., Zhou, X. (2011). Study on Security Architecture for Internet of Things. In: Zeng, D. (eds) Applied Informatics and Communication. ICAIC 2011. Communications in Computer and Information Science, vol 224. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23214-5_53

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23214-5_53

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23213-8

  • Online ISBN: 978-3-642-23214-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics