Building a secure infrastructure for IoT systems in distributed environments. (Une infrastructure sécurisée pour les systèmes IdO dans les environnements distribués)

The premise of the Internet of Things (IoT) is to interconnect not only sensors, mobile devices, and computers but also individuals, homes, smart buildings, and cities, as well as electrical grids, automobiles, and airplanes, to mention a few. However, realizing the extensive connectivity of IoT while ensuring user security and privacy still remains a challenge. There are many unconventional characteristics in IoT systems such as scalability, heterogeneity, mobility, and limited resources, which render existing Internet security solutions inadequate to IoT-based systems. Besides, the IoT advocates for peer-to-peer networks where users as owners intend to set security policies to control their devices or services instead of relying on some centralized third parties. By focusing on scientific challenges related to the IoT unconventional characteristics and user-centric security, we propose an IoT secure infrastructure enabled by the blockchain technology and driven by trustless peer-to-peer networks. Our IoT secure infrastructure allows not only the identification of individuals and collectives but also the trusted identification of IoT things through their owners by referring to the blockchain in trustless peer-to-peer networks. The blockchain provides our IoT secure infrastructure with a trustless, immutable and public ledger that records individuals and collectives identities, which facilitates the design of the simplified authentication protocol for IoT without relying on third-party identity providers. Besides, our IoT secure infrastructure adopts socialized IoT paradigm which allows all IoT entities (namely, individuals, collectives, things) to establish relationships and makes the IoT extensible and ubiquitous networks where owners can take advantage of relationships to set access policies for their devices or services. Furthermore, in order to protect operations of our IoT secure infrastructure against security threats, we also introduce an autonomic threat detection mechanism as the complementary of our access control framework, which can continuously monitor anomaly behavior of device or service operations.

[1]  Philip W. L. Fong Relationship-based access control: protection model and policy language , 2011, CODASPY '11.

[2]  Bill McCarty,et al.  Selinux: NSA's Open Source Security Enhanced Linux , 2004 .

[3]  Dragos Velicanu,et al.  A Decentralized Public Key Infrastructure with Identity Retention , 2014, IACR Cryptol. ePrint Arch..

[4]  Antonio Iera,et al.  Taking the SIoT down from the cloud: Integrating the Social Internet of Things in the INPUT architecture , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).

[5]  Vangelis Metsis,et al.  IoT Middleware: A Survey on Issues and Enabling Technologies , 2017, IEEE Internet of Things Journal.

[6]  Christine Morin,et al.  Reactive and Adaptive Security Monitoring in Cloud Computing , 2018, 2018 IEEE 3rd International Workshops on Foundations and Applications of Self* Systems (FAS*W).

[7]  Jürgen Gessner,et al.  Security architecture elements for IoT enabled automation networks , 2012, Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies & Factory Automation (ETFA 2012).

[8]  Jeannette M. Wing,et al.  An Attack Surface Metric , 2011, IEEE Transactions on Software Engineering.

[9]  Dominique Guinard,et al.  SOCRADES: A Web Service Based Shop Floor Integration Infrastructure , 2008, IOT.

[10]  Youakim Badr,et al.  Risk management and security in service-based architectures , 2009, 2009 International Conference on Advances in Computational Tools for Engineering Applications.

[11]  Mark Brown,et al.  Transport Layer Security (TLS) Authorization Extensions , 2010, RFC.

[12]  Zhimin Gao,et al.  Blockchain-based Identity Management with Mobile Device , 2018, CRYBLOCK@MobiSys.

[13]  Xiang Li,et al.  Middleware Systems for Wireless Sensor Networks: A Comparative Survey , 2014 .

[14]  Andrew P. Martin,et al.  On the Design and Development of webinos: A Distributed Mobile Application Middleware , 2012, DAIS.

[15]  Rodrigo Román Castro,et al.  SMEPP: A Secure Middleware For Embedded P2P , 2009 .

[16]  Audun Jøsang,et al.  Usability and Privacy in Identity Management Architectures , 2007, ACSW.

[17]  Benedict G. E. Wiedemann Protection? , 1998, Science.

[18]  Jaeho Kim,et al.  OpenIoT: An open service framework for the Internet of Things , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).

[19]  Eli Ben-Sasson,et al.  Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.

[20]  Jiafu Wan,et al.  Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[21]  Dragos Velicanu,et al.  CertCoin : A NameCoin Based Decentralized Authentication System 6 . 857 Class Project , 2014 .

[22]  Antonio Iera,et al.  From "smart objects" to "social objects": The next evolutionary step of the internet of things , 2014, IEEE Communications Magazine.

[23]  Salim Hariri,et al.  Anomaly-Based Behavior Analysis of Wireless Network Security , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).

[24]  Praveen Gauravaram,et al.  Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[25]  Michael Huth,et al.  Relationship-based access control: its expression and enforcement through hybrid logic , 2012, CODASPY '12.

[26]  Ricardo Neisse,et al.  A Model-Based Security Toolkit for the Internet of Things , 2014, 2014 Ninth International Conference on Availability, Reliability and Security.

[27]  Federica Paganelli,et al.  A Scalable Grid and Service-Oriented Middleware for Distributed Heterogeneous Data and System Integration in Context-Awareness-Oriented Domains , 2010 .

[28]  Shen Noether,et al.  Ring SIgnature Confidential Transactions for Monero , 2015, IACR Cryptol. ePrint Arch..

[29]  Raja Lavanya,et al.  Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.

[30]  Amit Mitra,et al.  Statistical Quality Control , 2002, Technometrics.

[31]  Domenico Rotondi,et al.  IoT@Work automation middleware system design and architecture , 2012, Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies & Factory Automation (ETFA 2012).

[32]  Sugata Sanyal,et al.  Survey of Security and Privacy Issues of Internet of Things , 2015, ArXiv.

[33]  Simon Haykin,et al.  Neural Networks and Learning Machines , 2010 .

[34]  S. Zarghami,et al.  Middleware for the Internet of Things , 2013 .

[35]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[36]  Kazumaro Aoki,et al.  SEC X.2: Recommended Elliptic Curve Domain Parameters , 2008 .

[37]  Yang Lijun,et al.  Security Architecture and Key Technologies for IoT/CPS , 2011 .

[38]  Lionel Brunie,et al.  Trust management and reputation systems in mobile participatory sensing applications: A survey , 2015, Comput. Networks.

[39]  Vitalik Buterin A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .

[40]  Neal Koblitz,et al.  CM-Curves with Good Cryptographic Properties , 1991, CRYPTO.

[41]  Alex Pentland,et al.  Verifiable Anonymous Identities and Access Control in Permissioned Blockchains , 2019, ArXiv.

[42]  Emmanuel Bertin,et al.  A Community-Driven Access Control Approach in Distributed IoT Environments , 2017, IEEE Communications Magazine.

[43]  Antonio Iera,et al.  The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization , 2012, Comput. Networks.

[44]  Jaeho Kim,et al.  A device software platform for consumer electronics based on the internet of things , 2015, IEEE Transactions on Consumer Electronics.

[45]  Jaehong Park,et al.  Classifying and Comparing Attribute-Based and Relationship-Based Access Control , 2017, CODASPY.

[46]  Beng Chin Ooi,et al.  BLOCKBENCH: A Framework for Analyzing Private Blockchains , 2017, SIGMOD Conference.

[47]  Xuemei Zhu,et al.  Practical PID Controller Implementation and the Theory Behind , 2009, 2009 Second International Conference on Intelligent Networks and Intelligent Systems.

[48]  Rodrigo Roman,et al.  On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.

[49]  Shamal Faily,et al.  The webinos project , 2012, WWW.

[50]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[51]  Lukas Kencl,et al.  Security and privacy of using AllJoyn IoT framework at home and beyond , 2016, 2016 2nd International Conference on Intelligent Green Building and Smart Grid (IGBSG).

[52]  Guiran Chang,et al.  TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..

[53]  Hans P. Reiser,et al.  Distributed Applications and Interoperable Systems , 2017, Lecture Notes in Computer Science.

[54]  Alessandro Armando,et al.  Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps , 2008, FMSE '08.

[55]  Ravi S. Sandhu,et al.  Object-to-Object Relationship-Based Access Control: Model and Multi-Cloud Demonstration (Invited Paper) , 2016, 2016 IEEE 17th International Conference on Information Reuse and Integration (IRI).

[56]  Daniele Miorandi,et al.  A secure and quality-aware prototypical architecture for the Internet of Things , 2016, Inf. Syst..

[57]  Louise Axon,et al.  Privacy-awareness in blockchain-based PKI , 2015 .

[58]  Mustafa Al-Bassam SCPKI: A Smart Contract-based PKI and Identity System , 2017 .

[59]  Frank Y. Li,et al.  Security in Mobile Wireless Sensor Networks - A Survey , 2011, J. Commun..

[60]  Youakim Badr,et al.  Fog Computing Security Architecture for the Internet of Things Using Blockchain-Based Social Networks , 2018, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[61]  Luigi Atzori,et al.  Neighbor discovery algorithms for friendship establishment in the social Internet of Things , 2016, 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT).

[62]  Diego López-de-Ipiña,et al.  Otsopack: Lightweight semantic framework for interoperable ambient intelligence applications , 2014, Comput. Hum. Behav..

[63]  Ghofrane Fersi,et al.  Middleware for Internet of Things: A Study , 2015, 2015 International Conference on Distributed Computing in Sensor Systems.

[64]  A. Jøsang,et al.  User Centric Identity Management , 2005 .

[65]  Youakim Badr,et al.  Identity Management Systems for the Internet of Things: A Survey Towards Blockchain Solutions , 2018, Sensors.

[66]  Nader Mohamed,et al.  Challenges in middleware solutions for the internet of things , 2012, 2012 International Conference on Collaboration Technologies and Systems (CTS).

[67]  Silvio Micali,et al.  The knowledge complexity of interactive proof-systems , 1985, STOC '85.

[68]  Sarah Meiklejohn,et al.  Who Am I? Secure Identity Registration on Distributed Ledgers , 2017, DPM/CBT@ESORICS.

[69]  Mani B. Srivastava,et al.  SensorAct: A Decentralized and Scriptable Middleware for Smart Energy Buildings , 2015, 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom).

[70]  Elisa Bertino,et al.  Identity Management: Concepts, Technologies, and Systems , 2010 .

[71]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[72]  Daniel Davis Wood,et al.  ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .

[73]  Elisa Bertino,et al.  Preserving privacy of feedback providers in decentralized reputation systems , 2012, Comput. Secur..

[74]  Alexander G. Loukianov,et al.  Decentralized adaptive recurrent neural control structure , 2007, Eng. Appl. Artif. Intell..

[75]  Dan Boneh,et al.  Bulletproofs: Short Proofs for Confidential Transactions and More , 2018, 2018 IEEE Symposium on Security and Privacy (SP).

[76]  Mahdi Ben Alaya,et al.  Toward semantic interoperability in oneM2M architecture , 2015, IEEE Communications Magazine.

[77]  Suxia Cui,et al.  Industrial Internet of Things , 2018 .

[78]  A. Shipley SECURITY IN THE INTERNET OF THINGS Lessons from the Past for the Connected Future , 2013 .

[79]  A. Ayer The Identity of Indiscernibles , 1954 .

[80]  Neeli R. Prasad,et al.  BETaaS: A Platform for Development and Execution of Machine-to-Machine Applications in the Internet of Things , 2016, Wirel. Pers. Commun..

[81]  Bart Preneel,et al.  RIPEMD-160: A Strengthened Version of RIPEMD , 1996, FSE.

[82]  Antonio F. Gómez-Skarmeta,et al.  Formal description of the SWIFT identity management framework , 2011, Future Gener. Comput. Syst..

[83]  C. Murray Woodside,et al.  Evaluating the scalability of distributed systems , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.

[84]  Domenico Rotondi,et al.  A capability-based security approach to manage access control in the Internet of Things , 2013, Math. Comput. Model..

[85]  Anthony Rowe,et al.  Sensor Andrew: Large-scale campus-wide sensing and actuation , 2011, IBM J. Res. Dev..

[86]  Guy Pujolle,et al.  A Survey on Identity Management for the Future Network , 2013, IEEE Communications Surveys & Tutorials.

[87]  Andreas M. Antonopoulos,et al.  Mastering Bitcoin: Unlocking Digital Crypto-Currencies , 2014 .

[88]  Paul Fremantle,et al.  A Reference Architecture For The Internet of Things , 2015 .

[89]  Qun Li,et al.  Fog Computing: Platform and Applications , 2015, 2015 Third IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb).

[90]  Rodrigo Roman,et al.  A cross-layer approach for integrating security mechanisms in sensor networks architectures , 2011, Wirel. Commun. Mob. Comput..

[91]  John Hughes,et al.  Security Assertion Markup Language (SAML) 2.0 Technical Overview , 2004 .

[92]  Eve Maler,et al.  The Venn of Identity: Options and Issues in Federated Identity Management , 2008, IEEE Security & Privacy.

[93]  Anas Abou El Kalam,et al.  FairAccess: a new Blockchain-based access control framework for the Internet of Things , 2016, Secur. Commun. Networks.

[94]  Maria Gradinariu Potop-Butucaru,et al.  BANZKP: A secure authentication scheme using zero knowledge proof for WBANs , 2016, 2016 13th International Conference on New Technologies for Distributed Systems (NOTERE).

[95]  Antonio F. Gómez-Skarmeta,et al.  Distributed Capability-based Access Control for the Internet of Things , 2013, J. Internet Serv. Inf. Secur..

[96]  Paul Fremantle,et al.  A survey of secure middleware for the Internet of Things , 2017, PeerJ Prepr..

[97]  Donald E. Eastlake,et al.  US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF) , 2011, RFC.

[98]  Soma Bandyopadhyay,et al.  A Survey of Middleware for Internet of Things , 2011, WiMo/CoNeCo.

[99]  Benjamin Leiding,et al.  Authcoin: Validation and Authentication in Decentralized Networks , 2016, MCIS.

[100]  William George,et al.  Transforming Face-to-Face Identity Proofing into Anonymous Digital Identity Using the Bitcoin Blockchain , 2017, 2017 15th Annual Conference on Privacy, Security and Trust (PST).

[101]  Ragib Hasan,et al.  Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things , 2015, 2015 IEEE World Congress on Services.

[102]  Audun Jøsang,et al.  A User-centric Federated Single Sign-on System , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).

[103]  Mani B. Srivastava,et al.  SensorAct: a privacy and security aware federated middleware for building management , 2012, BuildSys '12.

[104]  Adam M. Ross,et al.  A framework for evolving system of systems engineering , 2007 .

[105]  Laura Ricci,et al.  Blockchain Based Access Control , 2017, DAIS.

[106]  Luigi Atzori,et al.  Trustworthiness management in the IoT: The importance of the feedback , 2017, 2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN).

[107]  Vijay Varadharajan,et al.  Wireless sensor network key management survey and taxonomy , 2010, J. Netw. Comput. Appl..

[108]  Bo Yang,et al.  Efficient naming, addressing and profile services in Internet-of-Things sensory environments , 2014, Ad Hoc Networks.

[109]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[110]  Stefan A. Brands,et al.  Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy , 2000 .

[111]  Yuesheng Zhu,et al.  TinyZKP: A Lightweight Authentication Scheme Based on Zero-Knowledge Proof for Wireless Body Area Networks , 2014, Wirel. Pers. Commun..

[112]  Valery V. Korotaev,et al.  A Reference Model for Internet of Things Middleware , 2018, IEEE Internet of Things Journal.

[113]  Ricardo Neisse,et al.  DIAT: A Scalable Distributed Architecture for IoT , 2015, IEEE Internet of Things Journal.

[114]  Peter Rosengren,et al.  A Development Platform for Integrating Wireless Devices and Sensors into Ambient Intelligence Systems , 2009, 2009 6th IEEE Annual Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks Workshops.

[115]  Joerg Swetina,et al.  Toward a standardized common M2M service layer platform: Introduction to oneM2M , 2014, IEEE Wireless Communications.

[116]  Jia Guo,et al.  Trust-Based Service Management for Social Internet of Things Systems , 2016, IEEE Transactions on Dependable and Secure Computing.

[117]  Jaap-Henk Hoepman,et al.  The Identity Crisis. Security, Privacy and Usability Issues in Identity Management , 2011, ArXiv.

[118]  Harry Halpin NEXTLEAP: Decentralizing Identity with Privacy for Secure Messaging , 2017, ARES.

[119]  Imran A. Zualkernan,et al.  Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).

[120]  Michael J. Covington,et al.  Threat implications of the Internet of Things , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).

[121]  Lingfeng Wang,et al.  Multi-agent control system with information fusion based comfort model for smart buildings , 2012 .

[122]  Hyunseung Choo,et al.  On Evaluating IoTivity Cloud Platform , 2017, ICCSA.

[123]  Florian Kerschbaum,et al.  Zero-knowledge using garbled circuits: how to prove non-algebraic statements efficiently , 2013, IACR Cryptol. ePrint Arch..

[124]  Maurizio A. Spirito,et al.  The VIRTUS Middleware: An XMPP Based Architecture for Secure IoT Communications , 2012, 2012 21st International Conference on Computer Communications and Networks (ICCCN).

[125]  A. W. Roscoe,et al.  User interactive Internet of things privacy preserved access control , 2012, 2012 International Conference for Internet Technology and Secured Transactions.

[126]  Maria Gradinariu Potop-Butucaru,et al.  BAN-GZKP: Optimal Zero Knowledge Proof Based Scheme for Wireless Body Area Networks , 2017, 2017 IEEE 14th International Conference on Mobile Ad Hoc and Sensor Systems (MASS).

[127]  María N. Moreno García,et al.  A formal definition of RESTful semantic web services , 2010, WS-REST '10.

[128]  Drummond Reed,et al.  OpenID 2.0: a platform for user-centric identity management , 2006, DIM '06.

[129]  Damian Hodgson,et al.  “Know your customer”: marketing, governmentality and the “new consumer” of financial services , 2002 .

[130]  Joaquin Garcia-Alfaro,et al.  Data Privacy Management, Cryptocurrencies and Blockchain Technology , 2017, Lecture Notes in Computer Science.

[131]  Luigi Atzori,et al.  Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.

[132]  Dick Hardt,et al.  The OAuth 2.0 Authorization Framework , 2012, RFC.

[133]  Tassos Dimitriou,et al.  A Lightweight RFID Protocol to protect against Traceability and Cloning attacks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[134]  Salim Hariri,et al.  IoT Security Framework for Smart Cyber Infrastructures , 2016, 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W).

[135]  Vittorio Bertocci,et al.  Understanding Windows CardSpace: An Introduction to the Concepts and Challenges of Digital Identities , 2007 .

[136]  Antonio Iera,et al.  A subjective model for trustworthiness evaluation in the social Internet of Things , 2012, 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC).

[137]  Eli Ben-Sasson,et al.  SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge , 2013, CRYPTO.

[138]  Edna Dias Canedo,et al.  Proposal of a secure, deployable and transparent middleware for Internet of Things , 2014, 2014 9th Iberian Conference on Information Systems and Technologies (CISTI).

[139]  Ravikiran Vatrapu,et al.  BPDIMS: A Blockchain-based Personal Data and Identity Management System , 2019, HICSS.

[140]  G. Padmavathi,et al.  A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.

[141]  Jesper Madsen,et al.  ZKBoo: Faster Zero-Knowledge for Boolean Circuits , 2016, USENIX Security Symposium.

[142]  Hubert Ritzdorf,et al.  On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..

[143]  Gail-Joon Ahn,et al.  Privacy-Enhanced User-Centric Identity Management , 2009, 2009 IEEE International Conference on Communications.

[144]  David Evans,et al.  Efficient Data Tagging for Managing Privacy in the Internet of Things , 2012, 2012 IEEE International Conference on Green Computing and Communications.

[145]  William George,et al.  A User-Centric System for Verified Identities on the Bitcoin Blockchain , 2017, DPM/CBT@ESORICS.

[146]  Fenye Bao,et al.  Dynamic trust management for internet of things applications , 2012, Self-IoT '12.

[147]  Jörg Daubert,et al.  On the Security and Privacy of Internet of Things Architectures and Systems , 2015, 2015 International Workshop on Secure Internet of Things (SIoT).

[148]  Christian Bonnet,et al.  oneM2M architecture based IoT framework for mobile crowd sensing in smart cities , 2016, 2016 European Conference on Networks and Communications (EuCNC).

[149]  Bharat K. Bhargava,et al.  An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing , 2010, 2010 29th IEEE Symposium on Reliable Distributed Systems.

[150]  Charles Bell,et al.  Beginning Sensor Networks with Arduino and Raspberry Pi , 2013, Apress.

[151]  Steve A. Schneider,et al.  Policy templates for relationship-based access control , 2013, 2013 Eleventh Annual Conference on Privacy, Security and Trust.

[152]  Eli Ben-Sasson,et al.  Scalable, transparent, and post-quantum secure computational integrity , 2018, IACR Cryptol. ePrint Arch..

[153]  Paulo F. Pires,et al.  Middleware Solutions for the Internet of Things , 2013, SpringerBriefs in Computer Science.

[154]  Smruti R. Sarangi,et al.  Internet of Things: Architectures, Protocols, and Applications , 2017, J. Electr. Comput. Eng..

[155]  Qiaoyan Wen,et al.  A privacy enhanced DNS scheme for the Internet of Things , 2011 .

[156]  Christian Bonnet,et al.  oneM2M Architecture Based User Centric IoT Application Development , 2015, 2015 3rd International Conference on Future Internet of Things and Cloud.

[157]  Ravi Sankar,et al.  A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.

[158]  Siobhán Clarke,et al.  Middleware for Internet of Things: A Survey , 2016, IEEE Internet of Things Journal.

[159]  Shuang Wang,et al.  An Identity Management System Based on Blockchain , 2017, 2017 15th Annual Conference on Privacy, Security and Trust (PST).

[160]  H. Hashim,et al.  A lightweight and secure TFTP protocol for smart environment , 2012, 2012 International Symposium on Computer Applications and Industrial Electronics (ISCAIE).

[161]  Zhou Cheng,et al.  Overview of the Internet of Things , 2011 .

[162]  Raffaele Giaffreda iCore: A Cognitive Management Framework for the Internet of Things , 2013, Future Internet Assembly.

[163]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[164]  Karl Aberer,et al.  A middleware for fast and flexible sensor network deployment , 2006, VLDB.

[165]  Muneeb Ali,et al.  Blockstack: Design and Implementation of a Global Naming System with Blockchains , 2016 .

[166]  S. Billings Nonlinear System Identification: NARMAX Methods in the Time, Frequency, and Spatio-Temporal Domains , 2013 .

[167]  Ravi S. Sandhu,et al.  An Attribute-Based Access Control Extension for OpenStack and Its Enforcement Utilizing the Policy Machine , 2016, 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC).

[168]  Cédric Tabin,et al.  Liberty Alliance Project , 2007 .

[169]  Aissam Outchakoucht,et al.  Dynamic Access Control Policy based on Blockchain and Machine Learning for the Internet of Things , 2017 .

[170]  Aniruddha S. Gokhale,et al.  Distributed Real-Time Managed Systems: A Model-Driven Distributed Secure Information Architecture Platform for Managed Embedded Systems , 2014, IEEE Software.

[171]  Elisa Bertino,et al.  A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model , 2013, IEEE Transactions on Information Forensics and Security.

[172]  Jong-Hyouk Lee,et al.  BIDaaS: Blockchain Based ID As a Service , 2018, IEEE Access.

[173]  Victor C. M. Leung,et al.  Specification-based Intrusion Detection for home area networks in smart grids , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[174]  Youakim Badr,et al.  Smart and safe self-adaption of connected devices based on discrete controllers , 2019, IET Softw..

[175]  Klaus Moessner,et al.  Enabling smart cities through a cognitive management framework for the internet of things , 2013, IEEE Communications Magazine.

[176]  Craig Gentry,et al.  Pinocchio: Nearly Practical Verifiable Computation , 2013, 2013 IEEE Symposium on Security and Privacy.