Development of an Innovative Internet of Things Security System

Recently, the concept of Internet of Things (IoT) has become the most popular term through the widespread of its applications such as greenhouse and telemedicine monitoring. Actually, building IoT systems requires an accurate infrastructure planning. Furthermore, management and security of these systems are considered as the most important challenges facing system developers. Certainly, the IoT security is more than a technical problem as it needs series of regulations and faultless security system for common purposes. So, the study of IoT security problem is an emergent issue to be introduced in a research paper. In this paper, the traditional techniques are studied and evaluated. Accordingly, analysis and design of innovative general purpose system, which protect the IoT resources such as devices and data against hacking or stealing, are proposed. The idea of proposed system is based on adaptation of the traditional algorithms to be compatible with the nature of IoT infrastructure, in addition to combining new techniques with the adapted ones to handle the research problem. Furthermore, an environment to simulate and test the proposed system is constructed. Finally, the results prove that the proposed system is more robust and efficient, which lead us to standardization.

[1]  Wei Jiang,et al.  Design of Real Time Multimedia Platform and Protocol to the Internet of Things , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[2]  Michael J. Covington,et al.  Threat implications of the Internet of Things , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).

[3]  Liang Zhou,et al.  Multimedia traffic security architecture for the internet of things , 2011, IEEE Network.

[4]  Gustavo de Veciana,et al.  Minimizing energy consumption in large-scale sensor networks through distributed data compression and hierarchical aggregation , 2004, IEEE Journal on Selected Areas in Communications.

[5]  Neil W. Bergmann,et al.  Server-based Internet of Things Architecture , 2012, 2012 IEEE Consumer Communications and Networking Conference (CCNC).

[6]  Shao Xiwen,et al.  Study on Security Issue of Internet of Things Based on RFID , 2012, 2012 Fourth International Conference on Computational and Information Sciences.

[7]  SklavosNicolas,et al.  Key management systems for sensor networks in the context of the Internet of Things , 2011 .

[8]  Jiafu Wan,et al.  Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[9]  Junwei Lv,et al.  A new clock synchronization architecture of network for Internet of Things , 2011, International Conference on Information Science and Technology.

[10]  Pascal Urien LLCPS: A new security framework based on TLS for NFC P2P applications in the Internet of Things , 2013, 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC).

[11]  Guanyu Li,et al.  Descriptive models for Internet of Things , 2010, 2010 International Conference on Intelligent Control and Information Processing.

[12]  Xin Zhou,et al.  Study on security architecture in the Internet of Things , 2011, Proceedings of 2012 International Conference on Measurement, Information and Control.

[13]  Gang Gan,et al.  Internet of Things Security Analysis , 2011, 2011 International Conference on Internet Technology and Applications.

[14]  Lida Xu,et al.  Compressed Sensing Signal and Data Acquisition in Wireless Sensor Networks and Internet of Things , 2013, IEEE Transactions on Industrial Informatics.

[15]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[16]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[17]  Dharma P. Agrawal,et al.  Gaussian versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.

[18]  Laurence T. Yang,et al.  Cyberentity Security in the Internet of Things , 2013, Computer.

[19]  Miao Wu,et al.  Research on the architecture of Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).

[20]  Jing Liu,et al.  Authentication and Access Control in the Internet of Things , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.

[21]  Yuxi Liu,et al.  Key Technologies and Applications of Internet of Things , 2012, 2012 Fifth International Conference on Intelligent Computation Technology and Automation.

[22]  Satish G. Kamble,et al.  Probabilistic model for Intrusion Detection in Wireless Sensor Network , 2012 .

[23]  Shen Bin,et al.  Research on data mining models for the internet of things , 2010, 2010 International Conference on Image Analysis and Signal Processing.

[24]  Antonio F. Gómez-Skarmeta,et al.  Oxygen Cylinders Management Architecture Based on Internet of Things , 2011, 2011 International Conference on Computational Science and Its Applications.

[25]  Óscar García-Morchón,et al.  HIP Security Architecture for the IP-Based Internet of Things , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.

[26]  Florian Michahelles,et al.  Architecting the Internet of Things , 2011 .

[27]  Cristina Alcaraz,et al.  Key management systems for sensor networks in the context of the Internet of Things , 2011, Comput. Electr. Eng..

[28]  Xiong Li,et al.  Research on the Architecture of Trusted Security System Based on the Internet of Things , 2011, 2011 Fourth International Conference on Intelligent Computation Technology and Automation.

[29]  Huansheng Ning,et al.  Future Internet of Things Architecture: Like Mankind Neural System or Social Organization Framework? , 2011, IEEE Communications Letters.

[30]  Jaydip Sen,et al.  Embedded security for Internet of Things , 2011, 2011 2nd National Conference on Emerging Trends and Applications in Computer Science.