Skip to main content

2020 | OriginalPaper | Buchkapitel

A Distributed Digital Object Architecture to Support Secure IoT Ecosystems

verfasst von : Angel Ruiz-Zafra, Roberto Magán-Carrión

Erschienen in: Optimization and Learning

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Security is one of the most challenging issues facing the Internet of Things. One of the most usual architecture for IoT ecosystems has three layers (Acquisition, Networks and Applications), and provides the security to the different elements of the IoT ecosystems through specific technology or techniques, available in the different layers. However, the deployment of security technology at each layer complicates the management and maintainability of the security credentials increasing the risk of information leak, greater manual intervention and complicates the maintainability of consistency of the sensitive data. In this paper we propose a new architecture model, where a fourth security layer has been added, containing all the security technology traditionally delegated to the other layers, removing them from other layers. This new model is supported by the widespread use of Digital Objects, covering all aspects including physical components, processes and sensed data.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Atzori, L., Iera, A., Morabito, G.: The Internet of Things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)CrossRef Atzori, L., Iera, A., Morabito, G.: The Internet of Things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)CrossRef
2.
Zurück zum Zitat Mazhelis, O., Tyrvainen, P.: A framework for evaluating Internet-of-Things platforms: application provider viewpoint. In: 2014 IEEE World Forum on Internet of Things (WF-IoT), pp. 147–152. IEEE, March 2014 Mazhelis, O., Tyrvainen, P.: A framework for evaluating Internet-of-Things platforms: application provider viewpoint. In: 2014 IEEE World Forum on Internet of Things (WF-IoT), pp. 147–152. IEEE, March 2014
3.
Zurück zum Zitat Ray, P.P.: A survey on Internet of Things architectures. J. King Saud Univ. Comput. Inf. Sci. (2016) Ray, P.P.: A survey on Internet of Things architectures. J. King Saud Univ. Comput. Inf. Sci. (2016)
4.
Zurück zum Zitat Leo, M., Battisti, F., Carli, M., Neri, A.: A federated architecture approach for Internet of Things security. In: Euro Med Telco Conference (EMTC), pp. 1–5. IEEE, November 2014 Leo, M., Battisti, F., Carli, M., Neri, A.: A federated architecture approach for Internet of Things security. In: Euro Med Telco Conference (EMTC), pp. 1–5. IEEE, November 2014
5.
Zurück zum Zitat Van Kranenburg, R., Bassi, A.: IoT challenges. Commun. Mob. Comput. 1(1), 9 (2012)CrossRef Van Kranenburg, R., Bassi, A.: IoT challenges. Commun. Mob. Comput. 1(1), 9 (2012)CrossRef
6.
Zurück zum Zitat Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commun. ACM 47(6), 53–57 (2004)CrossRef Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commun. ACM 47(6), 53–57 (2004)CrossRef
7.
Zurück zum Zitat Grant, I.: Insiders cause most IT security breaches. Comput. Wkly 26(8), 09 (2009) Grant, I.: Insiders cause most IT security breaches. Comput. Wkly 26(8), 09 (2009)
8.
Zurück zum Zitat Chaabouni, N., Mosbah, M., Zemmari, A., Sauvignac, C., Faruki, P.: Network intrusion detection for IoT security based on learning techniques. IEEE Commun. Surv. Tutor. 21, 2671–2701 (2019)CrossRef Chaabouni, N., Mosbah, M., Zemmari, A., Sauvignac, C., Faruki, P.: Network intrusion detection for IoT security based on learning techniques. IEEE Commun. Surv. Tutor. 21, 2671–2701 (2019)CrossRef
9.
Zurück zum Zitat Kothmayr, T., Schmitt, C., Hu, W., Brünig, M., Carle, G.: A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication. In: 2012 IEEE 37th Conference on Local Computer Networks Workshops (LCN Workshops), pp. 956–963. IEEE, October 2012 Kothmayr, T., Schmitt, C., Hu, W., Brünig, M., Carle, G.: A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication. In: 2012 IEEE 37th Conference on Local Computer Networks Workshops (LCN Workshops), pp. 956–963. IEEE, October 2012
10.
Zurück zum Zitat Hernández-Ramos, J.L., Jara, A.J., Marín, L., Skarmeta Gómez, A.F.: DCapBAC: embedding authorization logic into smart things through ECC optimizations. Int. J. Comput. Math. 93(2), 345–366 (2016)CrossRef Hernández-Ramos, J.L., Jara, A.J., Marín, L., Skarmeta Gómez, A.F.: DCapBAC: embedding authorization logic into smart things through ECC optimizations. Int. J. Comput. Math. 93(2), 345–366 (2016)CrossRef
11.
Zurück zum Zitat Kalra, S., Sood, S.K.: Secure authentication scheme for IoT and cloud servers. Pervasive Mob. Comput. 24, 210–223 (2015)CrossRef Kalra, S., Sood, S.K.: Secure authentication scheme for IoT and cloud servers. Pervasive Mob. Comput. 24, 210–223 (2015)CrossRef
12.
Zurück zum Zitat Zhang, B., Ma, X.X., Qin, Z.G.: Security architecture on the trusting Internet of Things. J. Electron. Sc. Technol. 9(4), 364–367 (2011) Zhang, B., Ma, X.X., Qin, Z.G.: Security architecture on the trusting Internet of Things. J. Electron. Sc. Technol. 9(4), 364–367 (2011)
13.
Zurück zum Zitat Paskin, N.: Digital object identifier (DOI®) system. Encycl. Libr.Inf. Sci. 3, 1586–1592 (2010) Paskin, N.: Digital object identifier (DOI®) system. Encycl. Libr.Inf. Sci. 3, 1586–1592 (2010)
14.
Zurück zum Zitat Catarinucci, L., et al.: An IoT-aware architecture for smart healthcare systems. IEEE Internet Things J. 2(6), 515–526 (2015)CrossRef Catarinucci, L., et al.: An IoT-aware architecture for smart healthcare systems. IEEE Internet Things J. 2(6), 515–526 (2015)CrossRef
15.
Zurück zum Zitat Zanella, A., Bui, N., Castellani, A., Vangelista, L., Zorzi, M.: Internet of Things for smart cities. IEEE Internet Things J. 1(1), 22–32 (2014)CrossRef Zanella, A., Bui, N., Castellani, A., Vangelista, L., Zorzi, M.: Internet of Things for smart cities. IEEE Internet Things J. 1(1), 22–32 (2014)CrossRef
16.
Zurück zum Zitat Sun, S., Lannom, L., Boesch, B.: Handle system overview (No. RFC 3650) (2003) Sun, S., Lannom, L., Boesch, B.: Handle system overview (No. RFC 3650) (2003)
Metadaten
Titel
A Distributed Digital Object Architecture to Support Secure IoT Ecosystems
verfasst von
Angel Ruiz-Zafra
Roberto Magán-Carrión
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-41913-4_16

Premium Partner