• Corpus ID: 17241489

Security , Privacy & Trust in Internet of Things : the road ahead

@inproceedings{Sicari2015SecurityP,
  title={Security , Privacy \& Trust in Internet of Things : the road ahead},
  author={Sabrina Sicari and Alessandra Rizzardi and Luigi Alfredo Grieco and Alberto Coen-Porisini},
  year={2015}
}
Internet of Things (IoT) is characterized by heterogeneous technologies, which concur to the provisioning of innovative services in various application domains. In this scenario, the satisfaction of security and privacy requirements plays a fundamental role. Such requirements include data confidentiality and authentication, access control within the IoT network, privacy and trust among users and things, and the enforcement of security and privacy policies. Traditional security countermeasures… 

Figures and Tables from this paper

A Survey on Security Issues in Internet of Thing
TLDR
This paper investigates security of internet of things include three main aspects: authentication, confidentiality and access control, important to ensure secure communication and safe sharing environment.
Problems of security networks internet things
  • S. G. Abdukhalilov
  • Computer Science
    2017 International Conference on Information Science and Communications Technologies (ICISCT)
  • 2017
TLDR
This study examines three key security requirements, with an emphasis on Internet systems of things: authentication, privacy and access control, and also addresses the problems and future trends in the Internet of things.
Internet of Things: Security of Embedded Devices
TLDR
The article deals with the main problems of ensuring security at all levels of the Internet of things architecture, as well as actual models for constructing protection systems for embedded devices.
On the design of lightweight link-layer security mechanisms in IoT systems
TLDR
This paper presents a large-scale simulation of the response of the immune system to computer attacks and shows clear patterns in howcells are attacked and in particular the response to denial of service attacks.
Analysis of vulnerabilities in low-power wide-area networks by example of the LoRaWAN
TLDR
One of the most common protocols for transmitting data from various sensors over long distances with minimal energy consumption is analyzed in order to identify potential vulnerabilities.
Gazing into the Crystal Ball: When the Future Internet Meets the Mobile Clouds
TLDR
The proposed Future-MCC is a novel architecture that capitalizes on such promising approaches in the Future Internet research arena and re-thinks their philosophy to better fit the evolution of MCC systems.
Flexible structures of lightweight block ciphers PRESENT, SIMON and LED
TLDR
Flexible and high-throughput hardware structures of the PRESENT, SIMON, and LED lightweight block ciphers are presented for IoT applications that provide versatile implementations that enable adaptive security level using a variable key size.

References

SHOWING 1-10 OF 151 REFERENCES
Internet of Things - New security and privacy challenges
  • R. Weber
  • Computer Science
    Comput. Law Secur. Rev.
  • 2010
A WSN-Oriented Key Agreement Protocol in Internet of Things
TLDR
Using the protocol not only can effectively prevent attacks from outside the network and can recognize the abnormal nodes which were captured or lapsed efficacy, it can reduce communication with abnormal nodes to improve network security, extending the lifetime of the network.
SECURING AND GOVERNING ACCESS IN AD-HOC NETWORKS OF INTERNET OF THINGS
TLDR
This paper proposes a framework for authentication, authorization and access control for an IoT environment using capability tokens, PKI and encryption which aims to use minimal computing resources.
Study of Recent Development about Privacy and Security of the Internet of Things
  • Hailong Feng, Wenxiu Fu
  • Computer Science
    2010 International Conference on Web Information Systems and Mining
  • 2010
TLDR
This paper depicts the current situation of the development of the Internet of Things and underlined that security and privacy issues exist ubiquitously, these problems are not completely solved until now.
Proposed embedded security framework for Internet of Things (IoT)
TLDR
The need to provide in-built security in the device itself to provide a flexible infrastructure for dynamic prevention, detection, diagnosis, isolation, and countermeasures against successful breaches is highlighted.
User interactive Internet of things privacy preserved access control
TLDR
This research aims to provide better privacy protections to IoTs, and user controlled privacy preserved access control protocol is proposed and context aware k-anonymity privacy policy and filter are designed.
Research on Data Security Technology in Internet of Things
TLDR
The Internet of Things is currently the most popular field of communication and information research directions, and how to ensure the transmission efficiency of business information under the premise of improving networking applications data security to protect the user's privacy data will be particularly important.
New paradigms for access control in constrained environments
TLDR
Physical Unclonable Functions (PUF) is presented, which can provide cheap, secure, tamper-proof secret keys to authentify constrained M2M devices and Embedded Subscriber Identity Module (eSIM) can provide cellular connectivity with scalability, interoperability and standard compliant security protocols.
Enforcement of security policy rules for the Internet of Things
  • R. Neisse, G. Steri, G. Baldini
  • Computer Science
    2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
  • 2014
TLDR
An efficient solution to enforcement security policy rules that addresses the challenge of protection of privacy in IoT, and takes a more general enterprise architecture approach for security and privacy engineering in IoT.
...
...