Loading [MathJax]/extensions/MathMenu.js
Overview of IoT Security Architecture | IEEE Conference Publication | IEEE Xplore

Overview of IoT Security Architecture


Abstract:

In the Internet of Things, services can be provisioned using centralized architectures, where central entities acquire, process, and provide information. Alternatively, d...Show More

Abstract:

In the Internet of Things, services can be provisioned using centralized architectures, where central entities acquire, process, and provide information. Alternatively, distributed architectures, where entities at the edge of the network exchange information and collaborate with each other in a dynamic way, can also be used. In order to understand the applicability and viability of this distributed approach, it is necessary to know its advantages and disadvantages not only in terms of security and privacy challenges. The purpose of this paper is to show that IoT three-layer security logic architecture and the distributed approach has various challenges that need to be solved, but also various interesting properties and strengths. It also focuses on security issues such as privacy protection and intrusion detection, etc. We also propose a high-level security management scheme based on blockchain for different IoT devices in the full life cycle. It also summarizes the main causes of the deficiencies and security problems in existing research work.
Date of Conference: 23-25 June 2019
Date Added to IEEE Xplore: 05 December 2019
ISBN Information:
Conference Location: Hangzhou, China
References is not available for this document.

I. Introduction

Since the International Telecommunication Union officially proposed the concept of Internet of Things (IoT)in 2005, technologies such as sensor networks, cloud computing, and microchips have matured over time, and the Internet of Things industry has also rapidly expanded. According to the latest statistics of the Statista portal, the number of connected devices has reached 17.6 billion in 2016 and is expected to exceed 30 billion by 2020. International Data Corporation predicts that the Internet of Things market will exceed $7 trillion by 2020. While the Internet of Things is developing at a rapid pace, its security is also facing severe challenges. At present, countries, enterprises and individuals have not established enough awareness of IoT security and privacy protection. The IoT security issue will not only bring property damage to users but also threaten the lives of users.

Select All
1.
V. Sachidananda, J. Toh, S. Siboni, A. Shabtai and Y. Elovici, "Poster: Towards exposing internet of things: A roadmap", Acm Sigsac Conference on Computer Communications Security, 2016.
2.
M. Rostami, M. Majzoobi, F. Koushanfar, D. S. Wallach and S. Devadas, "Slender puf protocol: A lightweight robust and secure authentication by substring matching", IEEE Symposium on Security Privacy Workshops, 2012.
3.
M. Hiller, A. G. Onalan, G. Sigl and M. Bossert, "Online reliability testing for puf key derivation", International Workshop on Trustworthy Embedded Devices, 2016.
4.
R. A. Scheel and A. Tyagi, "Characterizing composite user-device touchscreen physical unclonable functions (pufs)for mobile device authentication", International Workshop on Trustworthy Embedded Devices, 2015.
5.
I. Vasyltsov and S. Lee, "Entropy extraction from bio-signals in healthcare iot", Acm Workshop on Iot Privacy, 2015.
6.
H. Holisaz, S. Shamshiri, F. Baharvand and S. M. Fakhraie, "A lightweight secure provenance scheme for wireless sensor networks", IEEE International Conference on Parallel and Distributed Systems, 2012.
7.
Y. Zhu, J. Yan, Y. Tang, L. S. Yan and H. He, "Joint substation-transmission line vulnerability assessment against the smart grid", IEEE Transactions on Information Forensics Security, vol. 10, no. 5, pp. 1010-1024, 2017.
8.
Y. Zhang, Y. Xiang, X. Huang and L. Xu, "A cross-layer key establishment scheme in wireless mesh networks", Lecture Notes in Computer Science, vol. 8712, pp. 526-541, 2014.
9.
T. Hardjono and N. Smith, "Cloud-based commissioning of constrained devices using permissioned blockchains", Acm International Workshop on Iot Privacy, 2016.
10.
C. Altmeier, C. Mainka, J. Somorovsky and J. Schwenk, "Adidos - adaptive and intelligent fully-automatic detection of denial-of-service weaknesses in web services", International Workshop on Data Privacy Management, 2015.
11.
M. Q. Ali and E. Al-Shaer, "Configuration-based ids for advanced metering infrastructure", IEEE Power Energy Society General Meeting, 2013.
12.
E. Fernandes, J. Jung and A. Prakash, "Security analysis of emerging smart home applications", Security Privacy, 2016.
13.
P. Fremantle, B. Aziz, J. Kopecky and P. Scott, "Federated identity and access management for the internet of things", International Workshop on Secure Internet of Things, 2014.
14.
D. Guinard, M. Fischer and V. Trifa, "Sharing using social networks in a composable web of things", Proc of the Pervasive Computing Communications Workshops, 2010.
15.
A. C. Sarma and J. Girao, Identities in the Future Internet of Things, 2009.
16.
P. Mahalle, S. Babar, N. R. Prasad and R. Prasad, Identity management framework towards internet of things (iot): Roadmap and key challenges, 2010.
17.
S. Raza, S. Duquennoy, J. Hoglund, U. Roedig and T. Voigt, "Secure communication for the internet of things-a comparison of link-layer security and ipsec for 61owpan", Security Communication Networks, vol. 7, no. 12, pp. 2654-2668, 2015.
18.
R. Roman, C. Alcaraz, J. Lopez and N. Sklavos, "Key management systems for sensor networks in the context of the internet of things", Computers Electrical Engineering, vol. 37, no. 2, pp. 147-159, 2011.
19.
Browse by series: Ecrypt ii european network of excellence in cryptology ii.
20.
K. Beznosov, P. Inglesant, J. Lobo, R. Reeder and M. E. Zurko, "Usability meets access control: challenges and research opportunities", Acm Symposium on Access Control Models Technologies, 2009.
21.
V. Oleshchuk, "Internet of things and privacy preserving technologies", International Conference on Wireless Communication, 2009.
22.
M. Button, "Setting the watch privacy and ethics of cctv surveillance", International Journal of Law Crime Justice, vol. 39, no. 4, pp. 215-217, 2011.
23.
C. Hochleitner, C. Graf, P. Wolkerstorfer and M. Tscheligi, "utrustit - usable trust in the internet of things", International Conference on Trust, 2012.
24.
T. Teixeira, S. Hachem, V. Issarny and N. Georgantas, "Service oriented middleware for the internet of things: A perspective", European Conference on Towards A Service-based Internet, 2011.
25.
Y. Zhang, L. Wang, W. Sun, R. C. Green and M. Alam, "Distributed intrusion detection system in a multi-layer network architecture of smart grids", IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 796-808, 2011.
26.
K. Biswas and V. Muthukkumarasamy, "Securing smart cities using blockchain technology", 2016 IEEE 18th International Conference on High Perfor- mance Computing and Communications; IEEE 14th International Confer- ence on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), pp. 1392-1393, 2016.
27.
K. Gaurav, P. Goyal, V. Agrawal and S.L. Rao, "Iot transaction security", 5th Inter- national Conference on the Internet of Things (IoT), 2015.
28.
S.H. Hashemi, F. Faghri, P. Rausch and R.H. Campbell, "World of empowered iot users", 2016 IEEE First International Conference on Internet-of-Things De- sign and Implementation (IoTDI), pp. 13-24, 2016.
29.
L. Kokoris-Kogias, L. Gasser, I. Khoffi, P. Jovanovic, N. Gailly and B. Ford, "Managing identities using blockchains and cosi", 9th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2016) EPFL-TALK-220210, 2016.
Contact IEEE to Subscribe

References

References is not available for this document.