Introduction: Securing the Internet of Things

This chapter provides an overview of the security issues involved in the Internet of Things (IoT), the emerging network that connects electronic devices for information acquisition, exchange, and processing, which will become increasingly vulnerable to attackers in the future. IoT security must consider a wider range of issues than traditional cybersecurity, including data confidentiality, service availability and integrity, antimalware, information integrity, privacy protection, and access control. A four-layer security architecture is described, consisting of the sensing layer, network layer, service layer, and application–interface layer. Issues such as general device security, communication security, network security, and application security are also addressed.

[1]  Peter Booth,et al.  The impact of ERP systems on firm and business process performance , 2006, J. Enterp. Inf. Manag..

[2]  Yong Chen,et al.  A System Framework of Security Management in Enterprise Systems , 2013 .

[3]  Jeff K. Stratman,et al.  The impact of enterprise systems on corporate performance: A study of ERP, SCM, and CRM system implementations , 2007 .

[4]  M. Lim,et al.  RFID in the warehouse: A literature analysis (1995–2010) of its applications, benefits, challenges and future trends , 2013 .

[5]  Fei Wang,et al.  Junction Temperature Measurement of IGBTs Using Short-Circuit Current as a Temperature-Sensitive Electrical Parameter for Converter Prototype Evaluation , 2015, IEEE Transactions on Industrial Electronics.

[6]  Meng Wu,et al.  Cooperative communications based on trust model for mobile ad hoc networks , 2010, IET Inf. Secur..

[7]  Rolf Oppliger Security and Privacy in an Online World , 2011, Computer.

[8]  Senbo Chen,et al.  A Trust Evaluation Model for E-Learning Systems , 2014 .

[9]  Lida Xu,et al.  Enterprise Systems: State-of-the-Art and Future Trends , 2011, IEEE Transactions on Industrial Informatics.

[10]  Christian Floerkemeier,et al.  RFID Application Development With the Accada Middleware Platform , 2007, IEEE Systems Journal.

[11]  Rolf H. Weber,et al.  Internet of things - Governance quo vadis? , 2013, Comput. Law Secur. Rev..

[12]  Bin Sun,et al.  Trust management mechanism for Internet of Things , 2014 .

[13]  Andreas Tolk,et al.  The RQ-Tech methodology: a new paradigm for conceptualizing strategic enterprise architectures , 2014 .

[14]  HyungJun Kim,et al.  Security and Vulnerability of SCADA Systems over IP-Based Wireless Sensor Networks , 2012, Int. J. Distributed Sens. Networks.

[15]  Antonio Iera,et al.  The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization , 2012, Comput. Networks.

[16]  Laurence T. Yang,et al.  Cyberentity Security in the Internet of Things , 2013, Computer.

[17]  Jinho Choi,et al.  A general distributed consensus algorithm for wireless sensor networks , 2012, 2012 Wireless Advanced (WiAd).

[18]  Li D. Xu Information architecture for supply chain quality management , 2011 .

[19]  Doo Seop Eom,et al.  A Robust and Space-Efficient Stack Management Method for Wireless Sensor Network OS with Scarce Hardware Resources , 2012, Int. J. Distributed Sens. Networks.

[20]  Rodrigo Roman,et al.  On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.

[21]  Rodrigo Roman,et al.  Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..

[22]  Martin Hepp,et al.  Harvesting Wiki Consensus: Using Wikipedia Entries as Vocabulary for Knowledge Management , 2007, IEEE Internet Computing.

[23]  D. J. Wu,et al.  Investment in Enterprise Resource Planning: Business Impact and Productivity Measures , 2002, J. Manag. Inf. Syst..

[24]  Juan E. Tapiador,et al.  M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, UIC.

[25]  Lionel Touseau,et al.  Combining heterogeneous service technologies for building an Internet of Things middleware , 2012, Comput. Commun..

[26]  Leilani Battle,et al.  Building the Internet of Things Using RFID: The RFID Ecosystem Experience , 2009, IEEE Internet Computing.

[27]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[28]  Bin Wang,et al.  An emergency resource allocation model for maritime chemical spill accidents , 2014 .

[29]  Steven Furnell Making security usable: Are things improving? , 2007, Comput. Secur..

[30]  Lida Xu,et al.  IoT-Based Smart Rehabilitation System , 2014, IEEE Transactions on Industrial Informatics.

[31]  Imrich Chlamtac,et al.  Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.

[32]  Cong Wang,et al.  An Interactive Trust Model for Application Market of the Internet of Things , 2014, IEEE Transactions on Industrial Informatics.

[33]  Wu He,et al.  Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.

[34]  Roberto Di Pietro,et al.  Security in wireless ad-hoc networks - A survey , 2014, Comput. Commun..