The Security Strategies in IoT – A Road Map
Keywords:
Internet of Things, Security, Architecture, Embedded SecurityAbstract
The Internet of Things (IoT) is the escalation production of the Computer Science and Communication technology. The phrase IoT was originally proposed to connected objects with RFID technology. Presently, researchers relate IoT with sensors, actuators, GPS devices and Mobile devices. IoT has provided a capable prospect to build powerful industrial systems and applications. Recently large number of IoT applications have been developed and deployed. The significance of the security in the IoT is gradually budding and IoT is one of the most promising network technologies in the new network. This paper is a survey of the basic concept of IoT, background architecture and analyzes the security problems of IoT. And also we provide the requirements of embedded security, the solutions to resist different attacks and the technology for defying rage proofing of the embedded devices by the concept of trusted computing. Addressing this concern is equivalent to addressing the security issue of the hardware platform.
References
J. Zheng, D. Simplot-Ryl, C. Bisdikian, and H. Mouftah, “The Internet of Things,†in IEEE Communications Magazine, Volume:49 , Issue: 11, pp:30-31, 2011.E.Fleisch, and F.Mattern, Das Internet der Dinge, Springer, 1 edition, July 2005.
T. Fan and Y. Chen, “A Scheme of Data Management in the Internet of Things,†in 2nd IEEE International Conference on Network Infrastructure and Digital Content, Sept. 2010.
Y. Huang and G. Li, “A Semantic Analysis for Internet of Things,†in International Conference on Intelligent Computation Technology and Automation (ICICTA), May 2010.
WU Gongyi, WU Ying. Introduction to the Internet of things engineering [M]. Beijing: china machine press, 2012.
L. Tan and N. Wang, “Future internet: The internet of things,†in Proc. 3rd Int. Conf. Adv. Comput. Theory Eng. (ICACTE), Chengdu, China, Aug. 20–22, 2010, pp. V5-376–V5-380.
X. Jia, O. Feng, T. Fan, and Q. Lei, “RFID technology and its applications in internet of things (IoT),†in Proc. 2nd IEEE Int. Conf. Consum. Electron., Commun. Netw. (CECNet), Yichang, China, Apr. 21–23, 2012, pp. 1282–1285.
IEC/TR 62443-3-1,†industrial communication networks- network and system security – part 3-1: security technologies for industrial automation and control systemsâ€,2009.
NIST SP800-82, “ Guide to industrial control systems(ICS) security “, june 2011.
ISO/IEC 27002, “Information technology – security techniques – code of practice for information security managementâ€, june 2005.
Enterasys, network access control, March 2010, http://www.enterasys.com/company/literature/nac-wp.pdf.
Trusted computing group, trusted network connect specifications, http://www.trustedcomputinggroup.org/developers/trusted_network_connect/specifications.
IETF NEA Working group status page, http://www.tools.ietf.org/wg/nea/.
Mark weiser, “the computer for the twenty first century, “scientific American, pp.94-104, September, 1991.
A. Dix, J. Finlay, G.Abowd, and R.Beale, “Human-computer interaction, “prentice Hall, 3e, 2004.
G.D.Abowd, G.R.Hayes, G.lachello, J.A.Kientz, S.N.Patel, and M.M.Stevens, “prototypes and paratypes: Designing mobile and ubiquitous computing applications,†IEEE Pervasive computing, vol. 4, no. 4, pp.67-73, 2005
Maxim Raya and Jean-pierre hubaux, “The security of vehicular networks,†Technical report, Laboratory for computer communications and applications (LCA), School of computer and communication sciences, EPFL, Switzerland, March 2005.
P.Koopman, “Embedded system security,†IEEE Computer, vol. 37,issue. 7, pp.95-97, 2004.
T.Messerges, E. A. Dabbish, and R.H. Sloan, “Examining smart-card security under the threat of power analysis attacks,†IEEE Trans.computers, vol.51, pp.541-552,May 2002.
M. Abramovici, C.Stroud, and J. Emmert, “On-Line BIST and BIST-Based Diagnosis of FPGA logic blocks,†IEEE trans. On VLSI systems, Vol. 12, No.12, pp. 1284-1294, 2004.
S. Ravi, A. Raghunathan, P. Kocher, and S. Hattangady, “Security in Embedded systems: Design challenges,†ACM Transactions on Embedded computing systems, vol. 3,no. 3, pp.461-491, 2004.
URL:http://wp.netscape.com/eng/ss113
Bar-E1 ,â€An introduction to side channel Attacks “ , White paper, Discretix Technologies limited,
Downloads
Issue
Section
License
- Papers must be submitted on the understanding that they have not been published elsewhere (except in the form of an abstract or as part of a published lecture, review, or thesis) and are not currently under consideration by another journal published by any other publisher.
- It is also the authors responsibility to ensure that the articles emanating from a particular source are submitted with the necessary approval.
- The authors warrant that the paper is original and that he/she is the author of the paper, except for material that is clearly identified as to its original source, with permission notices from the copyright owners where required.
- The authors ensure that all the references carefully and they are accurate in the text as well as in the list of references (and vice versa).
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Attribution-NonCommercial 4.0 International that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
- The journal/publisher is not responsible for subsequent uses of the work. It is the author's responsibility to bring an infringement action if so desired by the author.