On the features and challenges of security and privacy in distributed internet of things

Computer Networks - Tập 57 Số 10 - Trang 2266-2279 - 2013
Rodrigo Román1, Jianying Zhou1, Javier López2
1Institute for Infocomm Research, 1 Fusionopolis Way #21-01 Connexis South Tower, Singapore 138632, Singapore
2Computer Science Department, University of Malaga, Campus de Teatinos s/n, Malaga 29071, Spain

Tóm tắt

Từ khóa


Tài liệu tham khảo

INFSO D.4 Networked Enterprise & RFID INFSO G.2 Micro & Nanosystems, in co-operation with the Working group RFID of the ETP EPOSS, Internet of things in 2020: Roadmap for the future, 27 May 2008.

CERP-IoT Cluster, Visions and Challenges for Realising the Internet of Things, European Commission, 2010.

O. Vermesan, P. Friess, P. Guillemin, S. Gusmeroli, H. Sundmaeker, A. Bassi, I.S. Jubert, M. Mazura, M. Harrison, M. Eisenhauer, P. Doody, Internet of Things Strategic Research Roadmap, Cluster of European Research Projects on the Internet of Things, CERP-IoT, 2011.

ThingWorx. <http://www.thingworx.com/> (accessed 11.12).

Cosm. <https://cosm.com/> (accessed 11.12).

A. Gómez-Goiri, D. López-de-Ipiña, On the complementarity of Triple Spaces and the Web of Things, in: 2nd International Workshop on Web of Things (WoT’11), San Francisco, USA, 2011.

Ning, 2012, Cyber-physical-social based security architecture for future internet of things, Advances in Internet of Things, 2, 1, 10.4236/ait.2012.21001

IoT-A project – internet of things architecture. <http://www.iot-a.eu> (accessed 11.12).

Joachim W. Walewski (Ed.), D1.2 – Initial Architectural Reference Model for IoT, IoT-A Project, 2011. <http://www.iot-a.eu/public/public-documents>.

Hydra project – Heterogeneous Physical Devices in a Distributed Architecture. <http://www.hydramiddleware.eu> (accessed 11.12).

Sensei Project – Integrating the Physical with the Digital World of the Network of the Future. <http://www.sensei-project.eu> (accessed 11.12).

M. Ohashi, Introduction of Ubiquitous Service Platform Project CUBIQ, in: 10th International Symposium on Autonomous Decentralized Systems (ISADS’11), Kobe, Japan, 2011, pp. 456–460.

Smartproducts Project – Proactive Knowledge for Smart Products. <http://www.smartproducts-project.eu> (accessed 11.12).

Sensinode NanoService. <http://www.sensinode.com> (accessed 11.12).

Jones, 2012

Tanenbaum, 2002

A. Williams. How the Internet of Things Helps us Understand Radiation Levels. <https://cosm.com/press> (accessed 11.12).

Viehland, 2010, The future of personal area networks in a ubiquitous computing world, International Journal of Advanced Pervasive and Ubiquitous Computing, 2, 30, 10.4018/japuc.2010040102

Schaffers, 2011, Smart cities and the future internet: towards cooperation frameworks for open innovation, vol. 6656, 431

Status of Cloud Services. Cloud Harmony. <http://cloudharmony.com/status> (accessed 11.12).

S. Babar, P. Mahalle, A. Stango, N. Prasad, R. Prasad, Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT), in: 3rd International Conference on Recent Trends in Network Security and Applications (CNSA’10), Chennai, India, 2010, pp. 420–429.

S. Turner, T. Polk, Security Challenges For the Internet of Things, in: IAB Interconnecting Smart Objects with the Internet Workshop, Prague, Czech Republic, 2011.

Roman, 2011, Securing the internet of things, IEEE Computer, 44, 51, 10.1109/MC.2011.291

A. Cavoukian, Privacy by Design… Take the Challenge, Information and Privacy Commissioner of Ontario, Canada, 2009.

Mahalle, 2010, Identity management framework towards Internet of Things (IoT): roadmap and key challenges, vol. 89, 430

Hartenstein, 2008, A tutorial survey on vehicular ad hoc networks, IEEE Communications Magazine, 46, 164, 10.1109/MCOM.2008.4539481

Ilie-Zudor, 2011, A survey of applications and requirements of unique identification systems and RFID techniques, Computers in Industry, 62, 227, 10.1016/j.compind.2010.10.004

J. Takalo-Mattila, J. Kiljander, M. Etelapera, J.-P. Soininen, Ubiquitous computing by utilizing semantic interoperability with item-level object identification, in: Second International ICST Conference on Mobile Networks and Management (MONAMI’10), Santander, Spain, 2010, pp. 198–209.

T. Bauge (Ed.), D3.5 – Global and Pluggable Sensor and Actuator Networking Framework, SENSEI Project, 2011. <http://www.sensei-project.eu/>.

H. Akram, M. Hoffmann, Supports for identity management in ambient environments – the hydra approach, in: 3rd International Conference on Systems and Networks Communications (ICSNC’08), Sliema, Malta, 2008, pp. 371–377.

D. Guinard, M. Fischer, V. Trifa, Sharing using social networks in a composable web of things, in: 1st International Workshop on the Web of Things (WoT’10), Mannheim, Germany, 2010, pp. 702–707.

S.G. Weber, L.A. Martucci, S. Ries, M. Mühlhäuser, Towards trustworthy identity and access management for the future internet, in: 4th International Workshop on Trustworthy Internet of People, Things & Services (Trustworthy IoPTS’10), 2010.

Sarma, 2009, Identities in the future internet of things, Wireless Personal Communications, 49, 353, 10.1007/s11277-009-9697-0

Z. Wei, C. Meinel, Implement role based access control with attribute certificates, in: 6th International Conference on Advanced Communication Technology (ICACT’04), Phoenix Park, Korea, 2004, pp. 536–540.

G. Bai, L. Yan, L. Gu, Y. Guo, X. Chen, Context-aware usage control for web of things, Security and Communication Networks (in press). http://dx.doi.org/10.1002/sec.424/abstract.

M. Brachmann, S.L. Keoh, O.G. Morchon, S.S. Kumar, End-to-end transport security in the IP-based internet of things, in: 21st International Conference on Computer Communications and Networks (ICCCN’12), Munich, Germany, 2012, pp. 1–5.

Mocana – NanoDTLS. <https://mocana.com/products.html> (accessed 11.12).

S. Raza, S. Duquennoy, J. Hglund, U. Roedig, T. Voigt, Secure communication for the internet of things – a comparison of link-layer security and IPsec for 6LoWPAN, Security and Communication Networks (in press). http://dx.doi.org/10.1002/sec.406/abstract.

Roman, 2011, Key management systems for sensor networks in the context of the internet of things, Computers & Electrical Engineering, 37, 147, 10.1016/j.compeleceng.2011.01.009

European Network of Excellence in Cryptology II. <http://www.ecrypt.eu.org/> (accessed 11.12).

I. Verbauwhede, J. Fan, Light-weight public key implementations for constrained devices, in: Workshop on Cryptography for the Internet of Things, Antwerp, Belgium, 2012.

K. Beznosov, P. Inglesant, J. Lobo, R. Reeder, M. Zurko, Panel: usability meets access control: challenges and research opportunities, in: 14th ACM Symposium on Access Control Models and Technologies (SACMAT’09), Stresa, Italy, 2009.

Aggarwal, 2008, A general survey of privacy-preserving data mining models and algorithms, vol. 34, 11

Y. Shen, S. Pearson, Privacy Enhancing Technologies: A Review, Tech. rep., HP Laboratories, 2011.

V. Oleshchuk, Internet of things and privacy preserving technologies, in: 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (WirelessVITAE’09), Aalborg, Denmark, 2009, pp. 336–340.

P. Angin, B. Bhargava, R. Ranchal, N. Singh, M. Linderman, L.B. Othmane, L. Lilien, An entity-centric approach for privacy and identity management in cloud computing, in: 29th IEEE Symposium on Reliable Distributed Systems (SRDS’10), New Delhi, India, 2010, pp. 177–183.

Weber, 2010, Internet of things new security and privacy challenges, Computer Law & Security Review, 26, 23, 10.1016/j.clsr.2009.11.008

S. Radomirovic, Towards a model for security and privacy in the internet of things, in: 1st International Workshop on the Security of the Internet of Things (SecIoT’10), Tokyo, Japan, 2010.

G. Broenink, J.-H. Hoepman, C. van’t Hof, R. van Kranenburg, D. Smits, T. Wisman, The privacy coach: supporting customer privacy in the Internet of things, in: Pervasive 2010 Conference Workshop on What can the Internet of Things do for the citizen? (CIoT’10), Helsinki, Finland, 2010, pp. 72–81.

Button, 2011, Setting the watch privacy and ethics of CCTV surveillance, International Journal of Law, Crime and Justice, 39, 215, 10.1016/j.ijlcj.2011.08.003

J.-H. Hoepman, In Things We Trust? Towards trustability in the Internet of Things, CoRR abs/1109.2637.

Køien, 2011, Reflections on trust in devices: an informal survey of human trust in an internet-of-things context, Wireless Personal Communications, 61, 495, 10.1007/s11277-011-0386-4

A. Jøsang, R. Hayward, S. Pope, Trust Network Analysis with Subjective Logic, in: 29th Australasian Computer Science Conference (ACSC’06), Hobart, Australia, 2006.

Cho, 2011, A survey on trust management for mobile ad hoc networks, IEEE Communications Surveys & Tutorials, 13, 562, 10.1109/SURV.2011.092110.00088

Trcek, 2011, Trust management in the pervasive computing era, IEEE Security & Privacy, 9, 52, 10.1109/MSP.2011.95

J. Robinson, I. Wakeman, D. Chalmers, B. Horsfall, Trust and the internet of things, in: Joint International Workshop on Trust in Location and Communications in Decentralised Computing (TruLoco’10), Morioka, Japan, 2010.

uTRUSTit Project – Usable Trust in the Internet of Things. <http://www.utrustit.eu> (accessed 11.12).

T. Teixeira, S. Hachem, V. Issarny, N. Georgantas, Service oriented middleware for the internet of things: a perspective, in: Proceedings of the 4th European Conference on Towards a Service-based Internet (ServiceWave’11), Poznan, Poland, 2011, pp. 220–229.

Giannetsos, 2009, Intrusion Detection in Wireless Sensor Networks

D. Petro, G. Vesztergombi, L. Fritsch, D3.2 – Threat Analysis, uTRUSTit Project, 2011. <http://www.utrustit.eu/>.

S. Amin, Y. jig Young, M. Siddiqui, C.S. Hong, A novel intrusion detection framework for IP-based sensor networks, in: International Conference on Information Networking (ICOIN’09), 2009, pp. 1–3.

Chen, 2011, A security situation sense model based on artificial immune system in the internet of things, Advanced Materials Research, 403–408, 2457, 10.4028/www.scientific.net/AMR.403-408.2457

G. Singh, F. Masseglia, C. Fiot, A. Marascu, P. Poncelet, Data mining for intrusion detection: from outliers to true intrusions, in: 13th Pacific–Asia Conference on Knowledge Discovery and Data Mining (PAKDD-09), Bangkok, Thailand, 2009.

Zhang, 2011, Distributed intrusion detection system in a multi-layer network architecture of smart grids, IEEE Transactions on Smart Grid, 2, 796, 10.1109/TSG.2011.2159818