A Novel Secure Architecture for the Internet of Things

The "Internet of Things"(IoT) opens opportunities for devices and softwares to share information on an unprecedented scale. However, such a large interconnected network poses new challenges to system developers and users. In this article, we propose a layered architecture of IoT system. Using this model, we try to identify and assess each layer's challenges. We also discuss several existing technologies that can be used make this architecture secure.

[1]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[2]  Chong Kuan Chen,et al.  IoT Security: Ongoing Challenges and Research Opportunities , 2014, 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications.

[3]  Rubem Pereira,et al.  Future internet: trends and challenges , 2015, Int. J. Space Based Situated Comput..

[4]  Danai Chasaki,et al.  Security challenges in the internet of things , 2015, Int. J. Space Based Situated Comput..

[5]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[6]  Gurpreet Singh Matharu,et al.  The Internet of Things: Challenges & security issues , 2014, 2014 International Conference on Emerging Technologies (ICET).

[7]  Nan Zhang,et al.  The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations , 2014, 2014 IEEE Symposium on Security and Privacy.

[8]  Haixia Xu,et al.  A secure delegation scheme of large polynomial computation in multi-party cloud , 2015, Int. J. Grid Util. Comput..

[9]  Alfredo De Santis,et al.  An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications , 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems.

[10]  Muhammad Zubair Shafiq,et al.  A large scale exploratory analysis of software vulnerability life cycles , 2012, 2012 34th International Conference on Software Engineering (ICSE).

[11]  George C. Hadjichristofi,et al.  Internet of Things: Security vulnerabilities and challenges , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).

[12]  Ioan Valentin Sita Building Control, Monitoring, Safety and Security Using Collaborative Systems , 2012, 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems.

[13]  L. O'Gorman,et al.  Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.

[14]  Renu Taneja,et al.  A time stamp-based elliptic curve cryptosystem for wireless ad-hoc sensor networks , 2014, Int. J. Space Based Situated Comput..

[15]  Leyla Bilge,et al.  The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching , 2015, 2015 IEEE Symposium on Security and Privacy.

[16]  Mike Shema Cross-Site Scripting , 2010 .

[17]  Rodrigo Roman,et al.  Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..

[18]  Christoph Sorge,et al.  A privacy-friendly architecture for future cloud computing , 2013, Int. J. Grid Util. Comput..