2 Related Works 2 . 1 Security Issues in the Internet of Things

The Internet of Things (IoT) is emerging as an attractive paradigm, and several IoT models and related security issues have received widespread attentions. In this paper, we focus on an existing U2IoT architecture (i.e., Unit IoT and Ubiquitous IoT), and propose a directed path based authentication scheme (DPAS) to realize security protection for the U2IoT architecture. Particularly, the directed path descriptor is introduced for the secret key distribution and cross-network authentication, and the proof mapping is applied to establish tri-dimensional equivalence relations among diverse nodes for achieving mutual authentication. Moreover, security analysis shows that DPAS achieves data confidentiality and integrity, authentication, anonymity and forward security, and performance analysis indicates that DPAS with moderate communication overhead and computation load is suitable for the IoT applications.

[1]  Wen-Guey Tzeng,et al.  Key establishment schemes against storage-bounded adversaries in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.

[2]  Syed Obaid Amin,et al.  RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks , 2009, Sensors.

[3]  Gerd Kortuem,et al.  Smart objects as building blocks for the Internet of things , 2010, IEEE Internet Computing.

[4]  Ken Sakamura,et al.  Ubiquitous ID: Standards for Ubiquitous Computing and the Internet of Things , 2010, IEEE Pervasive Computing.

[5]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[6]  Gerhard P. Hancke,et al.  Security Challenges for User-Oriented RFID Applications within the "Internet of Things" , 2010 .

[7]  Li D. Xu Information architecture for supply chain quality management , 2011 .

[8]  Liang Zhou,et al.  Multimedia traffic security architecture for the internet of things , 2011, IEEE Network.

[9]  José María Sierra,et al.  A light-weight authentication scheme for wireless sensor networks , 2011, Ad Hoc Networks.

[10]  William R. Claycomb,et al.  A novel node level security policy framework for wireless sensor networks , 2011, J. Netw. Comput. Appl..

[11]  Mohsen Guizani,et al.  Home M2M networks: Architectures, standards, and QoS improvement , 2011, IEEE Communications Magazine.

[12]  Rodrigo Roman,et al.  A cross-layer approach for integrating security mechanisms in sensor networks architectures , 2011, Wirel. Commun. Mob. Comput..

[13]  Qiaoyan Wen,et al.  Building the Internet of Things Using a Mobile RFID Security Protocol Based on Information Technology , 2011, CSISE.

[14]  Huansheng Ning,et al.  Future Internet of Things Architecture: Like Mankind Neural System or Social Organization Framework? , 2011, IEEE Communications Letters.

[15]  Rodrigo Roman,et al.  Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..

[16]  Sushil Jajodia,et al.  Securing Topology Maintenance Protocols for Sensor Networks , 2005, IEEE Transactions on Dependable and Secure Computing.

[17]  Jaydip Sen,et al.  Internet of Things - Applications and Challenges in Technology and Standardization , 2011 .

[18]  Jianhua Ma,et al.  Cyber-Individual Meets Brain Informatics , 2011, IEEE Intelligent Systems.

[19]  Cristina Alcaraz,et al.  Key management systems for sensor networks in the context of the Internet of Things , 2011, Comput. Electr. Eng..

[20]  Xuedong Liang,et al.  A Taxonomy of Agent Technologies for Ubiquitous Computing Environments , 2012, KSII Trans. Internet Inf. Syst..

[21]  Jianhua Ma,et al.  Research Challenges and Perspectives on Wisdom Web of Things (W2T) , 2016, Semantic Web Technologies for Intelligent Engineering Applications.

[22]  Marcella Atzori,et al.  Blockchain-Based Architectures for the Internet of Things: A Survey , 2017 .