Skip to main content
Top

2018 | OriginalPaper | Chapter

32. An Integrated Framework for Evaluating the Security Solutions to IP-Based IoT Applications

Authors : Gayathri Natesan, Jigang Liu, Yanjun Zuo

Published in: Information Technology - New Generations

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

As Internet of Things (IoT) applications have taken the center stage of the technology development recently, the security issues and concerns arise naturally and significantly due to IoT connection to the anonymous and untrusted internet. Although the security protocols and technology for the internet applications have been studied for decades, the ubiquity and heterogeneity of IoT applications present unique challenges in handling security issues and problems. In addition to developing new protocols or to upgrade the existing protocols, some research has been done in experimenting security approaches for IoT applications. Since the results of the current research are mainly based on either the related protocols or the applicable approaches, the results of the discussion is often limited to a particular environment or a specific situation. In this paper, based on a thorough study on the existing research accomplishment and published experiment results, an integrated framework is proposed for evaluating the security solutions for IP-based IoT applications with the considerations in hardware constraints, operational constraints and network scenarios. The results of the study shows the potentials in drawing a balanced view in evaluating the security solutions to IP-based IoT applications and laying a step-stone for the further standardization of related IoT protocols and approaches for the security issues.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Atzoria, L., Ierab, A., & Morabitoc, G. (2010). The internet of things: a survey. Computer Networks Magazine, 54(15), 2787–2805.CrossRef Atzoria, L., Ierab, A., & Morabitoc, G. (2010). The internet of things: a survey. Computer Networks Magazine, 54(15), 2787–2805.CrossRef
2.
go back to reference Bandyopadhyay, D., & Jaydip, S. (2011). Internet of things: applications and challenges in technology and standardization. Wireless Personal Communications, Springer, 58(1), 49–69.CrossRef Bandyopadhyay, D., & Jaydip, S. (2011). Internet of things: applications and challenges in technology and standardization. Wireless Personal Communications, Springer, 58(1), 49–69.CrossRef
3.
go back to reference Bojanova, I., Hulbart, G., & Vaos, J. (2014). Imagineering an internet of anything. Computer magazine, IEEE, 47(6), 72–77.CrossRef Bojanova, I., Hulbart, G., & Vaos, J. (2014). Imagineering an internet of anything. Computer magazine, IEEE, 47(6), 72–77.CrossRef
5.
go back to reference Bui, R. N., Lakkundi, V., Olivereau, A., Serbanati, A., & Rossi, M. (2012). Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples. IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM'12), 2012, pp. 1–7. Bui, R. N., Lakkundi, V., Olivereau, A., Serbanati, A., & Rossi, M. (2012). Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples. IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM'12), 2012, pp. 1–7.
6.
go back to reference Collotta, M., Pau, G., Salerno, V. M., & Scata, G. (2012). Wireless sensor networks to improve road monitoring. Wireless Sensor Networks – Technology and Aplications, 2012, pp. 323–346. Collotta, M., Pau, G., Salerno, V. M., & Scata, G. (2012). Wireless sensor networks to improve road monitoring. Wireless Sensor Networks – Technology and Aplications, 2012, pp. 323–346.
8.
go back to reference Garcia Morchon, O. (2013). Securing the IP-based Internet of Things with HIP and DTLS. Proceedings of the sixth ACM conference on Security and Privacy in Wireless and Mobile Networks, 2013, pp. 119–124. Garcia Morchon, O. (2013). Securing the IP-based Internet of Things with HIP and DTLS. Proceedings of the sixth ACM conference on Security and Privacy in Wireless and Mobile Networks, 2013, pp. 119–124.
9.
go back to reference Heer, T., Morchon, O. G., Hummen, R., Keoh, S. L., Kumar, S. S., & Wehrle, K. (2011). Security challenges in the IP-based Internet of Things. Wireless Personal Communications, 61(3), 527–542.CrossRef Heer, T., Morchon, O. G., Hummen, R., Keoh, S. L., Kumar, S. S., & Wehrle, K. (2011). Security challenges in the IP-based Internet of Things. Wireless Personal Communications, 61(3), 527–542.CrossRef
10.
go back to reference Hu, W., Tan, H., Corke, P., Chan Shih, W., & Jha, S. (2012). Toward trusted wireless sensor networks. Journal ACM Transactions on Sensor Networks (TOSN), 7(1), 5. Hu, W., Tan, H., Corke, P., Chan Shih, W., & Jha, S. (2012). Toward trusted wireless sensor networks. Journal ACM Transactions on Sensor Networks (TOSN), 7(1), 5.
11.
go back to reference Hummen, R., Shafagh, H., Raza S., Voigtzx, T., & WehrleR, K. (2014). Delegation-based authentication and authorization for the IP-based internet of things. Sensing, Communication, and Networking (SECON), Eleventh Annual IEEE International Conference, IEEE, 2014, pp. 284–292 Hummen, R., Shafagh, H., Raza S., Voigtzx, T., & WehrleR, K. (2014). Delegation-based authentication and authorization for the IP-based internet of things. Sensing, Communication, and Networking (SECON), Eleventh Annual IEEE International Conference, IEEE, 2014, pp. 284–292
12.
go back to reference Hummen, R., Wirtz, H., Henrik Ziegeldorf, J., Hiller, J., & Wehrle, K. (2013). Tailoring end-to-end IP security protocols to the internet of things. Network Protocols (ICNP), 21st IEEE International Conference, IEEE, 2013, pp. 1–10. Hummen, R., Wirtz, H., Henrik Ziegeldorf, J., Hiller, J., & Wehrle, K. (2013). Tailoring end-to-end IP security protocols to the internet of things. Network Protocols (ICNP), 21st IEEE International Conference, IEEE, 2013, pp. 1–10.
13.
go back to reference Kothmayr, T., Schmitt, C., Hu, W., Brünig, M., & Carle, G. (2013). DTLS based security and two-way authentication for the Internet of Things. Ad Hoc Networks, 11(8), 2710–2723. Kothmayr, T., Schmitt, C., Hu, W., Brünig, M., & Carle, G. (2013). DTLS based security and two-way authentication for the Internet of Things. Ad Hoc Networks, 11(8), 2710–2723.
14.
go back to reference Moskowitz, R. (2012). Host Identity Protocol Version 2 (HIPv2). IETF: Internet-draft. Moskowitz, R. (2012). Host Identity Protocol Version 2 (HIPv2). IETF: Internet-draft.
15.
go back to reference Moskowitz, R. (2012). HIP Diet EXchange (DEX). Internet Draft draft-moskowitz-hip-rg-dex-06, IETF; Pottie, G. J., Kaiser, W. J. (2000). Wireless integrated network sensors. Communications of the ACM, 43(5), 51–58. Moskowitz, R. (2012). HIP Diet EXchange (DEX). Internet Draft draft-moskowitz-hip-rg-dex-06, IETF; Pottie, G. J., Kaiser, W. J. (2000). Wireless integrated network sensors. Communications of the ACM, 43(5), 51–58.
17.
go back to reference Perrig, A., Szewczyk, R., Tygar, J. D., Victor, W., & Culler, E. (2002). SPINS: Security protocols for sensor networks. Journal of Wireless Networks, 8(5), 521–534.CrossRefMATH Perrig, A., Szewczyk, R., Tygar, J. D., Victor, W., & Culler, E. (2002). SPINS: Security protocols for sensor networks. Journal of Wireless Networks, 8(5), 521–534.CrossRefMATH
18.
go back to reference Pottie, G. J., & Kaiser, W. J. (2000). Wireless integrated network sensors. Communications of the ACM, 43(5), 51–58.CrossRef Pottie, G. J., & Kaiser, W. J. (2000). Wireless integrated network sensors. Communications of the ACM, 43(5), 51–58.CrossRef
20.
go back to reference Rescorla, E., & Modagugu, N. 2006, April. Datagram transport layer security. RFC 4347. Obsoleted by RFC 6347, updated by RFC 5746. Rescorla, E., & Modagugu, N. 2006, April. Datagram transport layer security. RFC 4347. Obsoleted by RFC 6347, updated by RFC 5746.
Metadata
Title
An Integrated Framework for Evaluating the Security Solutions to IP-Based IoT Applications
Authors
Gayathri Natesan
Jigang Liu
Yanjun Zuo
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-54978-1_32

Premium Partner