Weitere Kapitel dieses Buchs durch Wischen aufrufen
As Internet of Things (IoT) applications have taken the center stage of the technology development recently, the security issues and concerns arise naturally and significantly due to IoT connection to the anonymous and untrusted internet. Although the security protocols and technology for the internet applications have been studied for decades, the ubiquity and heterogeneity of IoT applications present unique challenges in handling security issues and problems. In addition to developing new protocols or to upgrade the existing protocols, some research has been done in experimenting security approaches for IoT applications. Since the results of the current research are mainly based on either the related protocols or the applicable approaches, the results of the discussion is often limited to a particular environment or a specific situation. In this paper, based on a thorough study on the existing research accomplishment and published experiment results, an integrated framework is proposed for evaluating the security solutions for IP-based IoT applications with the considerations in hardware constraints, operational constraints and network scenarios. The results of the study shows the potentials in drawing a balanced view in evaluating the security solutions to IP-based IoT applications and laying a step-stone for the further standardization of related IoT protocols and approaches for the security issues.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
Atzoria, L., Ierab, A., & Morabitoc, G. (2010). The internet of things: a survey. Computer Networks Magazine, 54(15), 2787–2805. CrossRef
Bandyopadhyay, D., & Jaydip, S. (2011). Internet of things: applications and challenges in technology and standardization. Wireless Personal Communications, Springer, 58(1), 49–69. CrossRef
Bojanova, I., Hulbart, G., & Vaos, J. (2014). Imagineering an internet of anything. Computer magazine, IEEE, 47(6), 72–77. CrossRef
Bormann, C., Ersue, M., & Keranen, A. (2013, October). Terminology for constrained node networks. draft-ietf-lwig-terminology-04 (Work in Progress), IETF. http://tools.ietf.org/html/draft-ietf-lwig-terminology-04
Bui, R. N., Lakkundi, V., Olivereau, A., Serbanati, A., & Rossi, M. (2012). Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples. IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM'12), 2012, pp. 1–7.
Collotta, M., Pau, G., Salerno, V. M., & Scata, G. (2012). Wireless sensor networks to improve road monitoring. Wireless Sensor Networks – Technology and Aplications, 2012, pp. 323–346.
ETSI TR 102681. (2010). Machine-to-Machine Communications (M2M); Smart Metering Use Cases. http://www.etsi.org
Garcia Morchon, O. (2013). Securing the IP-based Internet of Things with HIP and DTLS. Proceedings of the sixth ACM conference on Security and Privacy in Wireless and Mobile Networks, 2013, pp. 119–124.
Heer, T., Morchon, O. G., Hummen, R., Keoh, S. L., Kumar, S. S., & Wehrle, K. (2011). Security challenges in the IP-based Internet of Things. Wireless Personal Communications, 61(3), 527–542. CrossRef
Hu, W., Tan, H., Corke, P., Chan Shih, W., & Jha, S. (2012). Toward trusted wireless sensor networks. Journal ACM Transactions on Sensor Networks (TOSN), 7(1), 5.
Hummen, R., Shafagh, H., Raza S., Voigtzx, T., & WehrleR, K. (2014). Delegation-based authentication and authorization for the IP-based internet of things. Sensing, Communication, and Networking (SECON), Eleventh Annual IEEE International Conference, IEEE, 2014, pp. 284–292
Hummen, R., Wirtz, H., Henrik Ziegeldorf, J., Hiller, J., & Wehrle, K. (2013). Tailoring end-to-end IP security protocols to the internet of things. Network Protocols (ICNP), 21st IEEE International Conference, IEEE, 2013, pp. 1–10.
Kothmayr, T., Schmitt, C., Hu, W., Brünig, M., & Carle, G. (2013). DTLS based security and two-way authentication for the Internet of Things. Ad Hoc Networks, 11(8), 2710–2723.
Moskowitz, R. (2012). Host Identity Protocol Version 2 (HIPv2). IETF: Internet-draft.
Moskowitz, R. (2012). HIP Diet EXchange (DEX). Internet Draft draft-moskowitz-hip-rg-dex-06, IETF; Pottie, G. J., Kaiser, W. J. (2000). Wireless integrated network sensors. Communications of the ACM, 43(5), 51–58.
Olsson, J. (2014, October). 6LoWPAN demystified. Texas Instruments. Last accessed on 8 Sept 2016 at http://www.ti.com/lit/wp/swry013/swry013.pdf.
Pottie, G. J., & Kaiser, W. J. (2000). Wireless integrated network sensors. Communications of the ACM, 43(5), 51–58. CrossRef
Raza, S. Lightweight security solutions for the internet of things. Swedish Institute of Computer Science, SICS Dissertation Series 64. Retrieved on January 27, 2015 from http://www.shahidraza.info/pdf/thesis.pdf
Rescorla, E., & Modagugu, N. 2006, April. Datagram transport layer security. RFC 4347. Obsoleted by RFC 6347, updated by RFC 5746.
Shafagh, H. Leveraging public-key-based authentication for the internet of things. Masters thesis, RWTH Aachen University, Retrieved on January 27, 2015 from http://people.inf.ethz.ch/mshafagh/master_thesis_Hossein_Shafagh_PKC_in_the_IoT.pdf
Shelby, Z., Chakrabarti, S., Nordmark, E., & Bormann, C. (2012, November). Neighbor discovery dptimization for IPv6 over low-Power Wireless Personal Area Networks (6LoWPANs). RFC 6775, IETF. http://tools.ietf.org/html/rfc6775
- An Integrated Framework for Evaluating the Security Solutions to IP-Based IoT Applications
Neuer Inhalt/© ITandMEDIA