Abstract
The development of Internet of Things(IoT) will bring a new ubiquitous computing and communication era. Due to the lack of security mechanisms in the early Internet, we had to build patches to improve the security of it, which leads to that the Internet security is always a big risk. To avoid the same thing happened in building IoT, the security of IoT should be systematically studied from the beginning design of the IoT. In this paper, based on the studies on the IoT architecture and the analysis on the secure threats in IoT, the security architecture of the IoT is presented on the basis of the secure architecture of the information system, the related secure problems in the IoT are analyzed from the aspect of the secure service, secure domain and network layer. In addition, the limitation and the hardness work for the future are pointed out in this field.
This work is partially supported by NSFC Grant # 61070207.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Brock, D.L.: The Electronic Product Code (EPC), A Naming Scheme for Physical Objects. MIT AUTO-ID CENTER (2001)
Mayer, C.P.: Security and Privacy Challenges in the Internet of Things. Electronic Communications of the EASST 17, 1–12 (2009)
Sarma, S.E., Weis, S.A., Engels, D.W.: RFID systems and security and privacy implications. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454–469. Springer, Heidelberg (2003)
Sarma, S.E., Weis, S.A., Engels, D.W.: Radio frequency identification: Secure risks and challenges. RSA Laboratories Cryptobytes 6(1), 2–9 (2003)
Ohkubo, M., Suzuki, K., Kinoshita, S.: Hash-chain based forward secure privacy protection scheme for low-cost RFID. In: Proceedings of the 2004 Symposium on Cryptography and Information Security (SCIS 2004), Sendai, pp. 719–724 (2004)
YunLim: Symmetric encryption in RFID authentication protocol for strong location privacy and forward-security. In: 2006 International Conference on Hybrid Information Technology (ICHIT 2006), vol. 2, pp. 718–723 (November 2006)
Zhou, Y.-b., Feng, D.-g.: Design and analysis of cryptographic protocols for RFID. Chinese Journal of Computers 29(4), 581–589 (2006)
Zhu, S., Satia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-scale Distributed Sensor Networks. In: Proceedings of ACM Conference on computing and Communication Security, pp. 72–72. ACM Press, New York (2003)
Oliveira, L.B., Dahab, R., Lopez, J., et al.: Identity-based encryption for sensor networks. In: Proceedings of 5th Annual IEEE International Conference on Pervasive Computing and Communications Workshops, White Plains, NY, pp. 290–294 (2007)
Jolly, G., Kuscu, M.C., Kokate, P., Younis, M.: A low-energy key management protocol for wireless sensor networks. The 8th IEEE International Symposium on Computers and Communication, ISCC 2003 (June 2003)
Eltoweissy, M., Wadaa, A., Olariu, S., Wilson, L.: Group key management scheme for large-scale wireless sensor network. J. Ad Hoc Networks, 796–802 (September 2005)
Younis, M., Ghumman, K., Eltoweissy, M.: Location-aware combinatorial key management scheme for clustered sensor networks. IEEE Trans. Parallel and Distrib. Sys. (2006)
Eltoweissy, M., Moharrum, M., Mukkamala, R.: Dynamic key management in sensor networks. IEEE Communications Magazine, 122–130 (April 2006)
Wiechert, T., Thiesse, F., Michahelles, F., Schmitt, P., Fleisch, E.: Connecting mobile phones to the Internet of things: A discussion of compatibility issues between EPC and NFC. Presented at the Americas Conf. Inf. Syst. (AMCIS), Keystone, CO (2006)
Li, H., Yang, Y.-x.: Analysis on the Security Threads of TETRA System. Mobile Communications 3(29), 22–25 (2005)
ISO IS 7498-2. Information Processing Systems - Open Systems Interconnection Basic Reference Model-Part: Security Architecture. ISO Geneva, Switzerland (1989)
Department of Defense. Trusted Computer System Evaluation Criteria. Standard 5200.28-STD. (December 1985)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, H., Zhou, X. (2011). Study on Security Architecture for Internet of Things. In: Zeng, D. (eds) Applied Informatics and Communication. ICAIC 2011. Communications in Computer and Information Science, vol 224. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23214-5_53
Download citation
DOI: https://doi.org/10.1007/978-3-642-23214-5_53
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23213-8
Online ISBN: 978-3-642-23214-5
eBook Packages: Computer ScienceComputer Science (R0)