Open Access Open Access  Restricted Access Subscription Access

Network Privacy Reflection using Internet of Things

K. Thamizhmaran

Abstract


The current IP and other networks such as Power Smart Grids are fast developing, thus ensuing in diverse connectivity methodologies. This has led to the emergence of "the Internet of Things” (IoT) methodology whose goal is to transform the current IP and related networks to Device-to-Device (D-2-D) basis. It will seamlessly interconnect the globe via intelligent devices and sensors of varying types, this resulting in voluminous generation and exchange of data in excess of 20 billion Internet-connected objects and sensors (things) by 2022. The resultant structure will benefit mankind by helping us make tough decisions as well as be provisioned of beneficial services. In this paper, we overview both IoT enabled network architecture as well as security for associated objects and devices. We commence with a description of a generalized IoT enabled network's security architecture as well as how the various elements constituting them interact. We then describe an approach that allows the protection of both constrained and unconstrained IoT devices through robust encryption as well as authentication so that both can equally leverage from the same security framework, but still maintaining low computational loads, by avoiding excessive computational operations.

 

Key words: Internet Protocol, Encryption, Federated Clouds, Information Security, IoT, Smart Grid, Smart Objects.


Full Text:

PDF

References


Fremantle, P., Aziz, B., Kopecký, J., & Scott, P. (2014, September). Federated identity and access management for the internet of things. In 2014 International Workshop on Secure Internet of Things (pp. 10-17). IEEE.

Maria, P., Nicola, A., Xavier, V., Thomas, W., & Grieco, L. (2013). Standardized Protocol Stack for the Internet of (Important) Things. IEEE Communication Surveys and Tutorials, 15(3).

Souza, A. D., & Amazonas, J. D. (2015). A new internet of things architecture with cross-layer communication. In Proceedings of the 7th International Conference on Emerging Networks and Systems Intelligence Emerging (pp. 1-6).

Markmann, T., Schmidt, T. C., & Wählisch, M. (2015). Federated end-to-end authentication for the constrained internet of things using ibc and ecc. ACM SIGCOMM Computer Communication Review, 45(4), 603-604.

Bonetto, R., Bui, N., Lakkundi, V., Olivereau, A., Serbanati, A., & Rossi, M. (2012, June). Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples. In 2012 IEEE international symposium on a world of wireless, mobile and multimedia networks (WoWMoM) (pp. 1-7). IEEE.

ITU. ITU-T Y.2060. Intro to Internet of Things. https://www.itu.int/rec/T-REC-Y.2060-201206-I/en, June, 2012.

IEEE 802 Working Group. (2011). IEEE standard for local and metropolitan area networks—Part 15.4: Low-rate wireless personal area networks (lr-wpans). IEEE Std, 802, 4-2011.

Piro, G., Boggia, G., & Grieco, L. A. (2013). A standard compliant security framework for Low-power and Lossy Networks draft-piro-6tischsecurity-issues-01 (work in progress). IETF 6TiSCH WG, 20, 13.

Sajjad, S. M., & Yousaf, M. (2014, June). Security analysis of IEEE 802.15. 4 MAC in the context of Internet of Things (IoT). In 2014 Conference on Information Assurance and Cyber Security (CIACS) (pp. 9-14). IEEE.

Vollbrecht, J. R., Aboba, B., Blunk, L. J., Levkowetz, H., & Carlson, J. RFC 3748-Extensible Authentication Protocol (EAP).

Forsberg, D., Ohba, Y., Patil, B., Tschofenig, H., & Yegin, A. (2008). Protocol for carrying authentication for network access (PANA) (pp. 2070-1721). RFC 5191, May.


Refbacks

  • There are currently no refbacks.