Skip to main content

2018 | OriginalPaper | Buchkapitel

IoT and Big Data: An Architecture with Data Flow and Security Issues

verfasst von : Deepak Puthal, Rajiv Ranjan, Surya Nepal, Jinjun Chen

Erschienen in: Cloud Infrastructures, Services, and IoT Systems for Smart Cities

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Internet of Things (IoT) introduces a future vision where users, computer, computing devices and daily objects possessing sensing and actuating capabilities cooperate with unprecedented convenience and benefits. We are moving towards IoT trend, where the number of smart sensing devices deployed around the world is growing at a rapid speed. With considering the number of sources and types of data from smart sources, the sensed data tends to new trend of research i.e. big data. Security will be a fundamental enabling factor of most IoT applications and big data, mechanisms must also be designed to protect communications enabled by such technologies. This paper analyses existing protocols and mechanisms to secure the IoT and big data, as well as security threats in the domain. We have broadly divided the IoT architecture into several layers to define properties, security issues and related works to solve the security concerns.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Puthal, D., Nepal, S., Ranjan, R., Chen, J.: A dynamic prime number based efficient security mechanism for big sensing data streams. J. Comput. Syst. Sci. 83(1), 22–42 (2017)CrossRefMATHMathSciNet Puthal, D., Nepal, S., Ranjan, R., Chen, J.: A dynamic prime number based efficient security mechanism for big sensing data streams. J. Comput. Syst. Sci. 83(1), 22–42 (2017)CrossRefMATHMathSciNet
2.
Zurück zum Zitat Puthal, D., Nepal, S., Ranjan, R., Chen, J.: DLSeF: a dynamic key length based efficient real-time security verification model for big data stream. ACM Trans. Embedded Comput. Syst. 16(2), 51 (2016)CrossRef Puthal, D., Nepal, S., Ranjan, R., Chen, J.: DLSeF: a dynamic key length based efficient real-time security verification model for big data stream. ACM Trans. Embedded Comput. Syst. 16(2), 51 (2016)CrossRef
3.
Zurück zum Zitat Granjal, J., Monteiro, E., Sá Silva, J.: Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun. Surv. Tutor. 17(3), 1294–1312 (2015)CrossRef Granjal, J., Monteiro, E., Sá Silva, J.: Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun. Surv. Tutor. 17(3), 1294–1312 (2015)CrossRef
4.
Zurück zum Zitat Tien, J.: Big data: unleashing information. J. Syst. Sci. Syst. Eng. 22(2), 127–151 (2013)CrossRef Tien, J.: Big data: unleashing information. J. Syst. Sci. Syst. Eng. 22(2), 127–151 (2013)CrossRef
5.
Zurück zum Zitat Boldyreva, A., Fischlin, M., Palacio, A., Warinschi, B.: A closer look at PKI: security and efficiency. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 458–475. Springer, Heidelberg (2007). doi:10.1007/978-3-540-71677-8_30 CrossRef Boldyreva, A., Fischlin, M., Palacio, A., Warinschi, B.: A closer look at PKI: security and efficiency. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 458–475. Springer, Heidelberg (2007). doi:10.​1007/​978-3-540-71677-8_​30 CrossRef
6.
Zurück zum Zitat Puthal, D., Nepal, S., Ranjan, R., Chen, J.: A dynamic key length based approach for real-time security verification of big sensing data stream. In: Wang, J., Cellary, W., Wang, D., Wang, H., Chen, S.-C., Li, T., Zhang, Y. (eds.) WISE 2015. LNCS, vol. 9419, pp. 93–108. Springer, Cham (2015). doi:10.1007/978-3-319-26187-4_7 CrossRef Puthal, D., Nepal, S., Ranjan, R., Chen, J.: A dynamic key length based approach for real-time security verification of big sensing data stream. In: Wang, J., Cellary, W., Wang, D., Wang, H., Chen, S.-C., Li, T., Zhang, Y. (eds.) WISE 2015. LNCS, vol. 9419, pp. 93–108. Springer, Cham (2015). doi:10.​1007/​978-3-319-26187-4_​7 CrossRef
7.
Zurück zum Zitat Puthal, D., Nepal, S., Ranjan, R., Chen, J.: DPBSV- an efficient and secure scheme for big sensing data stream. In: 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 246–253 (2015) Puthal, D., Nepal, S., Ranjan, R., Chen, J.: DPBSV- an efficient and secure scheme for big sensing data stream. In: 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 246–253 (2015)
8.
Zurück zum Zitat Weber, R.: Internet of things-new security and privacy challenges. Comput. Law Secur. Rev. 26(1), 23–30 (2010)CrossRef Weber, R.: Internet of things-new security and privacy challenges. Comput. Law Secur. Rev. 26(1), 23–30 (2010)CrossRef
10.
Zurück zum Zitat Al-Fuqaha, A., et al.: Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 17(4), 2347–2376 (2015)CrossRef Al-Fuqaha, A., et al.: Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 17(4), 2347–2376 (2015)CrossRef
11.
Zurück zum Zitat Li, S., Xu, L., Zhao, S.: The internet of things: a survey. Inf. Syst. Front. 17(2), 243–259 (2015)CrossRef Li, S., Xu, L., Zhao, S.: The internet of things: a survey. Inf. Syst. Front. 17(2), 243–259 (2015)CrossRef
12.
Zurück zum Zitat Xu, L., He, W., Li, S.: Internet of things in industries: a survey. IEEE Trans. Industr. Inf. 10(4), 2233–2243 (2014)CrossRef Xu, L., He, W., Li, S.: Internet of things in industries: a survey. IEEE Trans. Industr. Inf. 10(4), 2233–2243 (2014)CrossRef
13.
Zurück zum Zitat Ilie-Zudor, E., et al.: A survey of applications and requirements of unique identification systems and RFID techniques. Comput. Ind. 62(3), 227–252 (2011)CrossRef Ilie-Zudor, E., et al.: A survey of applications and requirements of unique identification systems and RFID techniques. Comput. Ind. 62(3), 227–252 (2011)CrossRef
14.
Zurück zum Zitat Wang, Y., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutor. 8(2), 2–23 (2006)CrossRef Wang, Y., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutor. 8(2), 2–23 (2006)CrossRef
15.
Zurück zum Zitat IEEE Standard for Local and Metropolitan Area Networks—Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs) Amendment 1: MAC Sublayer, IEEE Std. 802.15.4e-2012 (Amendment to IEEE Std. 802.15.4–2011), (2011), pp. 1–225 (2012) IEEE Standard for Local and Metropolitan Area Networks—Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs) Amendment 1: MAC Sublayer, IEEE Std. 802.15.4e-2012 (Amendment to IEEE Std. 802.15.4–2011), (2011), pp. 1–225 (2012)
16.
Zurück zum Zitat Thubert, P.: Objective function zero for the routing protocol for low-power and lossy networks (RPL). RFC 6550 (2012) Thubert, P.: Objective function zero for the routing protocol for low-power and lossy networks (RPL). RFC 6550 (2012)
17.
Zurück zum Zitat Bormann, C., Castellani, A., Shelby, Z.: Coap: an application protocol for billions of tiny internet nodes. IEEE Internet Comput. 16(2), 62 (2012)CrossRef Bormann, C., Castellani, A., Shelby, Z.: Coap: an application protocol for billions of tiny internet nodes. IEEE Internet Comput. 16(2), 62 (2012)CrossRef
18.
Zurück zum Zitat Zheng, T., Ayadi, A., Jiang, X.: TCP over 6LoWPAN for industrial applications: an experimental study. In: 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp. 1–4 (2011) Zheng, T., Ayadi, A., Jiang, X.: TCP over 6LoWPAN for industrial applications: an experimental study. In: 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp. 1–4 (2011)
19.
Zurück zum Zitat Conzon, D., Bolognesi, T., Brizzi, P., Lotito, A., Tomasi, R., Spirito, M.: The virtus middleware: an XMPP based architecture for secure IoT communications. In: 21st International Conference on Computer Communications and Networks, pp. 1–6 (2012) Conzon, D., Bolognesi, T., Brizzi, P., Lotito, A., Tomasi, R., Spirito, M.: The virtus middleware: an XMPP based architecture for secure IoT communications. In: 21st International Conference on Computer Communications and Networks, pp. 1–6 (2012)
20.
Zurück zum Zitat Sicari, S., Rizzardi, A., Grieco, L., Coen-Porisini, A.: Security, privacy and trust in internet of things: the road ahead. Comput. Netw. 76, 146–164 (2015)CrossRef Sicari, S., Rizzardi, A., Grieco, L., Coen-Porisini, A.: Security, privacy and trust in internet of things: the road ahead. Comput. Netw. 76, 146–164 (2015)CrossRef
21.
Zurück zum Zitat Bandyopadhyay, S., Sengupta, M., Maiti, S., Dutta, S.: A survey of middleware for internet of things. In: Özcan, A., Zizka, J., Nagamalai, D. (eds.) CoNeCo/WiMo -2011. CCIS, vol. 162, pp. 288–296. Springer, Heidelberg (2011). doi:10.1007/978-3-642-21937-5_27 CrossRef Bandyopadhyay, S., Sengupta, M., Maiti, S., Dutta, S.: A survey of middleware for internet of things. In: Özcan, A., Zizka, J., Nagamalai, D. (eds.) CoNeCo/WiMo -2011. CCIS, vol. 162, pp. 288–296. Springer, Heidelberg (2011). doi:10.​1007/​978-3-642-21937-5_​27 CrossRef
22.
Zurück zum Zitat Colistra, G., Pilloni, V., Atzori, L.: The problem of task allocation in the internet of things and the consensus-based approach. Comput. Netw. 73, 98–111 (2014)CrossRef Colistra, G., Pilloni, V., Atzori, L.: The problem of task allocation in the internet of things and the consensus-based approach. Comput. Netw. 73, 98–111 (2014)CrossRef
23.
Zurück zum Zitat Fox, G., et al.: High performance data streaming in service architecture. Technical report, Indiana University and University of Illinois at Chicago (2004) Fox, G., et al.: High performance data streaming in service architecture. Technical report, Indiana University and University of Illinois at Chicago (2004)
24.
Zurück zum Zitat Nehme, R., Lim, H., Bertino, E., Rundensteiner, E.: StreamShield: a stream-centric approach towards security and privacy in data stream environments. In: ACM SIGMOD International Conference on Management of data, pp. 1027–1030 (2009) Nehme, R., Lim, H., Bertino, E., Rundensteiner, E.: StreamShield: a stream-centric approach towards security and privacy in data stream environments. In: ACM SIGMOD International Conference on Management of data, pp. 1027–1030 (2009)
25.
Zurück zum Zitat Chen, P., Wang, X., Wu, Y., Su, J., Zhou, H.: POSTER: iPKI: identity-based private key infrastructure for securing BGP protocol. In: ACM CCS, pp. 1632–1634 (2015) Chen, P., Wang, X., Wu, Y., Su, J., Zhou, H.: POSTER: iPKI: identity-based private key infrastructure for securing BGP protocol. In: ACM CCS, pp. 1632–1634 (2015)
Metadaten
Titel
IoT and Big Data: An Architecture with Data Flow and Security Issues
verfasst von
Deepak Puthal
Rajiv Ranjan
Surya Nepal
Jinjun Chen
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-67636-4_25