Security of ONS service for applications of the Internet of Things and their pilot implementation in academic network

The aim of the Object name services (ONS) project was to find a robust and stable way of automated communication to utilize name and directory services to support radio-frequency identification (RFID) ecosystem, mainly in the way that can leverage open source and standardized services and capability to be secured. All this work contributed to the new RFID services and Internet of Things (IoT) heterogeneous environments capabilities presentation. There is an increasing demand of transferred data volumes associated with each and every IP or non-IP discoverable objects. For example RFID tagged objects and sensors, as well as the need to bridge remaining communication compatibility issues between these two independent worlds. RFID and IoT ecosystems require sensitive implementation of security approaches and methods. There are still significant risks associated with their operations due to the content nature. One of the reasons of past failures could be lack of security as the integral part of design of each particular product, which is supposed to build ONS systems. Although we focused mainly on the availability and confidentiality concerns in this paper, there are still some remaining areas to be researched. We tried to identify the hardening impact by metrics evaluating operational status, resiliency, responsiveness and performance of managed ONS solution design. Design of redundant and hardened testing environment under tests brought us the visibility into the assurance of the internal communication security and showed behavior under the load of the components in such complex information service, with respect to an overall quality of the delivered ONS service.

[1]  M. Kijonka,et al.  Coal industry technologies simulation with virtual reality utilization , 2012, Proceedings of the 13th International Carpathian Control Conference (ICCC).

[2]  Juraj Vaculík,et al.  Principles of Selection, Implementation and Utilization of RFID in Supply Chain Management , 2009 .

[3]  Yuwei Zhang,et al.  RFID Information Acquisition: An Analysis and Comparison between ONS and LDAP , 2010, 2009 First International Conference on Information Science and Engineering.

[4]  Eric Vyncke,et al.  IPv6 Security , 2008 .

[5]  Klaus Finkenzeller,et al.  Rfid Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification , 2003 .

[6]  Elisa Bertino,et al.  RFID Security and Privacy , 2013, Synthesis Lectures on Information Security, Privacy, and Trust.

[7]  Youngsong Mun,et al.  Understanding IPv6 , 2005 .

[8]  Miroslav Voznak,et al.  Wireless sensors in complex networks: study and performance evaluation of a new hybrid model , 2014, Sensing Technologies + Applications.

[9]  Yi Xie,et al.  A security query protocol of ONS in EPC system , 2012, Anti-counterfeiting, Security, and Identification.

[10]  Salvatore Marano,et al.  Complex networks: Study and performance evaluation with hybrid model for Wireless Sensor Networks , 2014, 2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE).

[11]  Ken Buszta Security Management , 2007, Information Security Management Handbook, 6th ed..

[12]  Natalia Andreeva,et al.  Information Security Integral Engineering Technique and its Application in ISMS Design , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.

[13]  Nemai Chandra Karmakar Advanced RFID Systems, Security, and Applications , 2012 .

[14]  Vladimir Kebo RFID TECHNOLOGY IN LOGISTICS PROCESSES , 2013 .

[15]  Robert A. Scholtz,et al.  Performance Analysis of , 1998 .

[16]  Paula Raymond Lutui Performance analysis of IPv4 vs. IPv6 on various operating systems using jumbo frames , 2011 .

[17]  Rajendra Singh,et al.  Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS platforms , 2013 .

[18]  In Lee Rfid Technology Integration for Business Performance Improvement , 2014 .

[19]  David Sutton Information Risk Management: A practitioner's guide , 2014 .

[20]  Yvonne Schuhmacher,et al.  Rfid Handbook Fundamentals And Applications In Contactless Smart Cards And Identification , 2016 .

[21]  Keum-Suk Lee,et al.  A mobile agent security management , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..

[22]  Harvey Lehpamer RFID Design Principles , 2008 .

[23]  Wenhong Tian,et al.  A scheme to enhance security of RFID middleware , 2010, 2010 International Conference on Communications, Circuits and Systems (ICCCAS).