An access control management protocol for Internet of Things devices

The Internet of Things (IoT) enables the integration of data from virtual and physical worlds. 1 It involves smart objects that can understand and react to their environment in a variety of industrial, commercial and household settings. 2 As the IoT expands the number of connected devices, there is the potential to allow cyber-attackers into the physical world in which we live, as they seize on security holes in these new systems. 3 New security issues arise through the heterogeneity of IoT applications and devices and their large-scale deployment. The Internet of Things (IoT) enables the integration of data from virtual and physical worlds. But as the IoT expands it becomes more vulnerable to cyber-attackers. New security issues arise through the heterogeneity of IoT applications and devices and their large-scale deployment. Mark Taylor, Denis Reilly and Brett Lempereur of Liverpool John Moores University present a multi-tiered security approach for IoT devices that incorporates physical proximity controls, geo-location checking, instruction encryption, embedded controls and exception reporting.

[1]  Jan Nolin,et al.  The Internet of Things and convenience , 2016, Internet Res..

[2]  Maryline Laurent-Maknavicius,et al.  Survey on secure communication protocols for the Internet of Things , 2015, Ad Hoc Networks.

[3]  Virgílio A. F. Almeida,et al.  Governance Challenges for the Internet of Things , 2015, IEEE Internet Computing.

[4]  Fagen Li,et al.  Practical Secure Communication for Integrating Wireless Sensor Networks Into the Internet of Things , 2013, IEEE Sensors Journal.

[5]  Baolin Hou,et al.  Design of Distributed Remote Real-Time Monitoring and Control System Based on Internet , 2012 .

[6]  Thiemo Voigt,et al.  Lithe: Lightweight Secure CoAP for the Internet of Things , 2013, IEEE Sensors Journal.

[7]  Antonio F. Skarmeta,et al.  A decentralized approach for security and privacy challenges in the Internet of Things , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).

[8]  Susanna Spinsante,et al.  Secure end-to-end communication for constrained devices in IoT-enabled Ambient Assisted Living systems , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).

[9]  Theodore Tryfonas,et al.  The Internet of Things: a security point of view , 2016, Internet Res..

[10]  Hannes Tschofenig,et al.  Securing the Internet of Things: A Standardization Perspective , 2014, IEEE Internet of Things Journal.

[11]  Rodrigo Roman,et al.  On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.

[12]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[13]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[14]  Kwang-Cheng Chen,et al.  Information Fusion to Defend Intentional Attack in Internet of Things , 2014, IEEE Internet of Things Journal.

[15]  Jonathan Loo,et al.  6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach , 2012, Int. J. Commun. Syst..

[16]  Jorge Sá Silva,et al.  Network‐layer security for the Internet of Things using TinyOS and BLIP , 2014, Int. J. Commun. Syst..

[17]  Heljä Franssila Enhancing information interaction as a means for situation awareness maintenance in mobile field work , 2016, Cognition, Technology & Work.

[18]  Gregory Epiphaniou,et al.  Guidelines for Internet of Things Deployment Approaches - The Thing Commandments , 2013, EUSPN/ICTH.

[19]  Gerd Kortuem,et al.  Smart objects as building blocks for the Internet of things , 2010, IEEE Internet Computing.

[20]  Zhihua Li,et al.  A Multi-layer Security Model for Internet of Things , 2012 .

[21]  Donghee Shin,et al.  Der Open-access-publikationsserver Der Zbw – Leibniz-informationszentrum Wirtschaft the Open Access Publication Server of the Zbw – Leibniz Information Centre for Economics a Socio-technical Framework for Internet-of-things Design a Socio-technical Framework for Internet-of-things Design , 2022 .

[22]  Neeraj Suri,et al.  Assessing the security of internet-connected critical infrastructures , 2014, Secur. Commun. Networks.

[23]  Mario Piattini,et al.  Security patterns and requirements for internet-based applications , 2006, Internet Res..

[24]  Chong Kuan Chen,et al.  IoT Security: Ongoing Challenges and Research Opportunities , 2014, 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications.

[25]  H. Raghav Rao,et al.  Security analysis of Internet technology components enabling globally distributed workplaces—a framework , 2008, TOIT.

[26]  Xiaohui Liang,et al.  Sybil Attacks and Their Defenses in the Internet of Things , 2014, IEEE Internet of Things Journal.

[27]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[28]  Charles J. Petrie,et al.  Future Internet Protocols , 2012, IEEE Internet Comput..

[29]  Ramjee Prasad,et al.  Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things , 2012, J. Cyber Secur. Mobil..

[30]  Wendong Wang,et al.  IPv4 Address Sharing and Allocation for IPv6 Transition , 2015, IEEE Internet Computing.

[31]  Lina Yao,et al.  Web-Based Management of the Internet of Things , 2015, IEEE Internet Computing.

[32]  Yacine Challal,et al.  A Systemic Approach for IoT Security , 2013, 2013 IEEE International Conference on Distributed Computing in Sensor Systems.

[33]  Amin Hassanzadeh,et al.  Towards effective security control assignment in the Industrial Internet of Things , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).