Skip to main content
Erschienen in:
Buchtitelbild

2017 | OriginalPaper | Buchkapitel

Multi-layer Security Mechanism for Networked Embedded Devices

verfasst von : Christopher Mansour, Danai Chasaki

Erschienen in: Ubiquitous Computing and Ambient Intelligence

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Networked embedded systems are impacting the way we interact with the world around us. They are at the core of the advancements in information and communication technologies which have been driving the fourth generation revolution in today’s industry and networks. This technology allows for better integrated communications, integrated local and global control, supervision and maintenance. Billions of smart devices are being implemented - from smart TVs and cars to other smart health monitors and wearable technologies and this resulted in the development of smart interconnected environments. The core vision of the aforementioned smart interconnected environment is the realization of a reliable and secure two way communication between smart devices. However, the high level of heterogeneity, coupled with the wide scale of smart embedded systems, has magnified the security threats. Traditional security countermeasures and privacy cannot be enforced directly on such systems due to their limited computing capabilities and their diverse set of hardware architectures. In this paper we are proposing a multi-level security approach for smart interconnected environments/networks. We address the security at three main pillars: application level, system level, and network level.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Cao, J., Carminati, B., Ferrari, E., Tan, K.L.: CASTLE: continuously anonymizing data streams. IEEE Trans. Depend. Secur. Comput 8(3), 337–352 (2011)CrossRef Cao, J., Carminati, B., Ferrari, E., Tan, K.L.: CASTLE: continuously anonymizing data streams. IEEE Trans. Depend. Secur. Comput 8(3), 337–352 (2011)CrossRef
2.
Zurück zum Zitat Evans, D., Eyers, D.M.: Efficient data tagging for managing privacy in the internet of things. In: 2012 IEEE International Conference on Green Computing and Communications (GreenCom), pp. 244–248. IEEE (2012) Evans, D., Eyers, D.M.: Efficient data tagging for managing privacy in the internet of things. In: 2012 IEEE International Conference on Green Computing and Communications (GreenCom), pp. 244–248. IEEE (2012)
3.
Zurück zum Zitat Huang, X., Fu, R., Chen, B., Zhang, T., Roscoe, A.: User interactive internet of things privacy preserved access control. In: 2012 International Conference on Internet Technology and Secured Transactions, pp. 597–602. IEEE (2012) Huang, X., Fu, R., Chen, B., Zhang, T., Roscoe, A.: User interactive internet of things privacy preserved access control. In: 2012 International Conference on Internet Technology and Secured Transactions, pp. 597–602. IEEE (2012)
4.
Zurück zum Zitat Kothmayr, T., Schmitt, C., Hu, W., Brünig, M., Carle, G.: DTLS based security and two-way authentication for the internet of things. Ad Hoc Netw. 11(8), 2710–2723 (2013)CrossRef Kothmayr, T., Schmitt, C., Hu, W., Brünig, M., Carle, G.: DTLS based security and two-way authentication for the internet of things. Ad Hoc Netw. 11(8), 2710–2723 (2013)CrossRef
5.
Zurück zum Zitat Liu, T., Guan, Y.W., Yan, Y.Q., Liu, L., Deng, Q.C.: A WSN-oriented key agreement protocol in internet of things. In: Applied Mechanics and Materials. vol. 401, pp. 1792–1795. Trans Tech Publications (2013) Liu, T., Guan, Y.W., Yan, Y.Q., Liu, L., Deng, Q.C.: A WSN-oriented key agreement protocol in internet of things. In: Applied Mechanics and Materials. vol. 401, pp. 1792–1795. Trans Tech Publications (2013)
6.
Zurück zum Zitat Martinez-Julia, P., Skarmeta, A.F.: Beyond the separation of identifier and locator: building an identity-based overlay network architecture for the future internet. Comput. Netw. 57(10), 2280–2300 (2013)CrossRef Martinez-Julia, P., Skarmeta, A.F.: Beyond the separation of identifier and locator: building an identity-based overlay network architecture for the future internet. Comput. Netw. 57(10), 2280–2300 (2013)CrossRef
7.
Zurück zum Zitat Piro, G., Boggia, G., Grieco, L.A.: A standard compliant security framework for IEEE 802.15.4 networks. In: 2014 IEEE World Forum on Internet of Things (WF-IoT), pp. 27–30. IEEE (2014) Piro, G., Boggia, G., Grieco, L.A.: A standard compliant security framework for IEEE 802.15.4 networks. In: 2014 IEEE World Forum on Internet of Things (WF-IoT), pp. 27–30. IEEE (2014)
8.
Zurück zum Zitat Roman, R., Alcaraz, C., Lopez, J., Sklavos, N.: Key management systems forsensor networks in the context of the internet of things. Comput. Electr. Eng. 37(2), 147–159 (2011)CrossRef Roman, R., Alcaraz, C., Lopez, J., Sklavos, N.: Key management systems forsensor networks in the context of the internet of things. Comput. Electr. Eng. 37(2), 147–159 (2011)CrossRef
9.
Zurück zum Zitat Schaller, A., Arul, T., van der Leest, V., Katzenbeisser, S.: Lightweight anti-counterfeiting solution for low-end commodity hardware using inherent PUFs. In: Holz, T., Ioannidis, S. (eds.) Trust 2014. LNCS, vol. 8564, pp. 83–100. Springer, Cham (2014). doi:10.1007/978-3-319-08593-7_6 Schaller, A., Arul, T., van der Leest, V., Katzenbeisser, S.: Lightweight anti-counterfeiting solution for low-end commodity hardware using inherent PUFs. In: Holz, T., Ioannidis, S. (eds.) Trust 2014. LNCS, vol. 8564, pp. 83–100. Springer, Cham (2014). doi:10.​1007/​978-3-319-08593-7_​6
10.
Zurück zum Zitat Wang, Y., Wen, Q.: A privacy enhanced DNS scheme for the internet of things. In: IET International Conference on Communication Technology and Application (ICCTA 2011), pp. 699–702. IET (2011) Wang, Y., Wen, Q.: A privacy enhanced DNS scheme for the internet of things. In: IET International Conference on Communication Technology and Application (ICCTA 2011), pp. 699–702. IET (2011)
11.
Zurück zum Zitat Evans, D., Eyers, D.M.: Efficient data tagging for managing privacy in the internet of things. Chin. J. Comput. 34(8), 1351–1364 (2011)CrossRef Evans, D., Eyers, D.M.: Efficient data tagging for managing privacy in the internet of things. Chin. J. Comput. 34(8), 1351–1364 (2011)CrossRef
12.
Zurück zum Zitat Yang, J., Fang, B.: Security model and key technologies for the internet of things. J. China Univ. Posts Telecommun. 18, 109–112 (2011)CrossRef Yang, J., Fang, B.: Security model and key technologies for the internet of things. J. China Univ. Posts Telecommun. 18, 109–112 (2011)CrossRef
14.
Zurück zum Zitat Zhao, Y.L.: Research on data security technology in internet of things. In: Applied Mechanics and Materials, vol. 433, pp. 1752–1755. Trans Tech Publications (2013) Zhao, Y.L.: Research on data security technology in internet of things. In: Applied Mechanics and Materials, vol. 433, pp. 1752–1755. Trans Tech Publications (2013)
Metadaten
Titel
Multi-layer Security Mechanism for Networked Embedded Devices
verfasst von
Christopher Mansour
Danai Chasaki
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-67585-5_1