Requirement of Security for IoT Application based on Gateway System

@article{Kim2015RequirementOS,
  title={Requirement of Security for IoT Application based on Gateway System},
  author={Jung Tae Kim},
  journal={International journal of security and its applications},
  year={2015},
  volume={9},
  pages={201-208}
}
  • Jung Tae Kim
  • Published 31 October 2015
  • Computer Science
  • International journal of security and its applications
An integrated security mechanism is one of the key challenges in the open wireless network architecture because of the diversity of the wireless network in open wireless network and the unique security mechanism used in each one of these networks. The security consideration should satisfy a concise set of cryptographic and security mechanisms, single security policy framework, and configuration parameters policydependent. This may require consideration of system perspectives, taking into… 

Figures from this paper

A New Efficient and Secure Architecture Model for Internet of Things
TLDR
The proposed IoT-EAA architecture model increases security and decrease the power and time consumption, which consider an important contribution to improving the performance of IoT architecture.
A New Security Method for the Internet of Things Based on Ciphering and Deciphering Algorithms
  • A. A. Ahmad
  • Computer Science
    Kirkuk University Journal-Scientific Studies
  • 2018
TLDR
The proposed cryptographic algorithm is capable of providing the enhanced security of data and information from the sensor or Radio Frequency Identification (RFID) sub systems of IoT to communication network such as Internet to cloud storage.
Security in Internet of Things: Issues, Challenges and Solutions
In the recent past, Internet of Things (IoT) has been a focus of research. With the great potential of IoT, there comes many types of issues and challenges. Security is one of the main issues for IoT
Security Requirements for the Internet of Things: A Systematic Approach
TLDR
It is argued that by adhering to the proposed requirements, an IoT system can be designed securely by achieving much of the promised benefits of scalability, usability, connectivity, and flexibility in a practical and comprehensive manner.
Privacy Challenges and Their Solutions in IoT
TLDR
This chapter presents various issues related to privacy and security in IoT like standardization, networking and addressing ones and also deals within solutions provided for academic, technical and industrial aspects for IoT enabled environment.
The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey
TLDR
This work formalizes the task of securing big data and its scope, provides a taxonomy to categories threats to fog-based IoT systems, presents a comprehensive comparison of state-of-the-art contributions in the field according to their security service and recommends promising research directions for future investigations.
A Design of Automated Vulnerability Information Management System for Secure Use of Internet-Connected Devices Based on Internet-Wide Scanning Methods
TLDR
A system for remotely collecting information from Internet-connected devices and using scanning techniques to identify and manage vulnerability information from IoT devices is proposed and improves the open-source Zmap engine to solve a realistic problem when attempting to scan through real Internet.
Exploitation of the Promising Technology: Using BlockChain to Enhance the Security of IoT.
TLDR
This study will investigate the problem of IoT security issues and what the possibility of employing promising technologies such a BlockChain (BC) to enhance the security aspect of IoT environment, especially on the application layer.
Securing openHAB Smart Home through User Authentication and Authorization
TLDR
This work studied and implemented a JSON Web Token-based authenticator for Eclipse SmartHome, the core of openHAB, as a base for access control mechanisms, and proposes a fine-grained, yet usable authorization model to manage access permissions to things among legitimate users.
Trusted cognitive sensor based dual routing network on Internet of things
TLDR
The proposed design focuses on developing a communication with a reliable model between sources to destination based on the TCSRN—trusted cognitive sensor based dual routing network on the IoT.
...
...

References

SHOWING 1-10 OF 17 REFERENCES
Study on security architecture in the Internet of Things
  • Hui Li, Xin Zhou
  • Computer Science
    Proceedings of 2012 International Conference on Measurement, Information and Control
  • 2012
TLDR
The security requirements in different layers of the lOT are analyzed to establish a security architecture system for the expecting to offer a theoretical reference for the establishment of reliable security systems of information for the in the future.
Poster Abstract: Security Comes First, a Public-key Cryptography Framework for the Internet of Things
TLDR
In this ongoing work, necessary components of an interoperable secure End-to-End communication while incorporating Public-key Cryptography (PKC) are identified and involved computational and communication overheads are tackled.
Study on a Secure Wireless Data Communication in Internet of Things Applications
TLDR
The integrated approach is a new and effective way to secure the data transmission of the WLAN related IOT applications and shows that the safety of Iot related data transmission is the key for successful IOT related businesses.
A decentralized approach for security and privacy challenges in the Internet of Things
TLDR
A distributed capability-based access control mechanism which is built on public key cryptography in order to cope with some of the major challenges related to security and privacy for the IoT deployment on a broad scale.
Network and Data Link Layer Security for DASH7
TLDR
This paper shows the implementation results of network and data link layer security by using advanced encryption standard (AES) counter with CBC-MAC (CCM) over CC430 sensor nodes.
Application of dynamic variable cipher security certificate in Internet of Things
TLDR
The security structure of sensor layer, network layer, and application layer in IOT is described, and dynamic variable cipher security certificate is presented, a new method of ID authentication among node and node in sensor layer.
Short paper: Overcoming IoT fragmentation through standard gateway architecture
TLDR
The presented solution aims at harmonizing different standards and architectures, improving sustainability and security, and allows to use a IaaS approach to further enhance the sensor networks business model.
IOT Gateway: BridgingWireless Sensor Networks into Internet of Things
TLDR
An IOT Gateway system based on Zigbee and GPRS protocols according to the typical IOT application scenarios and requirements from telecom operators is proposed and the data transmission between wireless sensor networks and mobile communication networks, protocol conversion of different sensor network protocols, and control functionalities for sensor networks are presented.
A Novel Approach to IoT Security Based on Immunology
TLDR
Simulation experiment results show that the proposed approach to IoT security may provide a novel effective method to ensure IoT security.
Ecosystem-driven design of in-home terminals based on open platform for the Internet-of-Things
  • Zhibo Pang, Junzhe Tian
  • Computer Science
    16th International Conference on Advanced Communication Technology
  • 2014
TLDR
An ecosystem-driven design strategy is proposed and applied in the design of an open-platform-based in-home healthcare terminal that meets the interoperability, security, and system integration requirements.
...
...