Privacy and security federated reference architecture for Internet of Things

被引:5
|
作者
Kamal, Musab [1 ]
Rashid, Imran [1 ]
Iqbal, Waseem [1 ]
Siddiqui, Muhammad Haroon [1 ]
Khan, Sohaib [1 ]
Ahmad, Ijaz [2 ]
机构
[1] Natl Univ Sci & Technol, Dept Informat Secur, Islamabad 44000, Pakistan
[2] Majan Univ Coll, Fac Informat Technol, Muscat 112, Oman
关键词
Architecturally significant requirement (ASR); Architecture trade-off analysis method (ATAM); Internet architecture board; Internet of Things (IoT); Privacy enhancing technologies; Privacy validation chain; TP393; IOT ARCHITECTURES; CHALLENGES; ISSUES;
D O I
10.1631/FITEE.2200368
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Physical objects are getting connected to the Internet at an exceptional rate, making the idea of the Internet of Things (IoT) a reality. The IoT ecosystem is evident everywhere in the form of smart homes, health care systems, wearables, connected vehicles, and industries. This has given rise to risks associated with the privacy and security of systems. Security issues and cyber attacks on IoT devices may potentially hinder the growth of IoT products due to deficiencies in the architecture. To counter these issues, we need to implement privacy and security right from the building blocks of IoT. The IoT architecture has evolved over the years, improving the stack of architecture with new solutions such as scalability, management, interoperability, and extensibility. This emphasizes the need to standardize and organize the IoT reference architecture in federation with privacy and security concerns. In this study, we examine and analyze 12 existing IoT reference architectures to identify their shortcomings on the basis of the requirements addressed in the standards. We propose an architecture, the privacy-federated IoT security reference architecture (PF-IoT-SRA), which interprets all the involved privacy metrics and counters major threats and attacks in the IoT communication environment. It is a step toward the standardization of the domain architecture. We effectively validate our proposed reference architecture using the architecture trade-off analysis method (ATAM), an industry-recognized scenario-based approach.
引用
收藏
页码:481 / 508
页数:28
相关论文
共 50 条
  • [31] Security and Privacy Challenges in Industrial Internet of Things
    Sadeghi, Ahmad-Reza
    Wachsmann, Christian
    Waidner, Michael
    [J]. 2015 52ND ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2015,
  • [32] Privacy and Security in Internet of Things and Wearable Devices
    Arias, Orlando
    Wurm, Jacob
    Khoa Hoang
    Jin, Yier
    [J]. IEEE TRANSACTIONS ON MULTI-SCALE COMPUTING SYSTEMS, 2015, 1 (02): : 99 - 109
  • [33] Security and privacy in the Internet of Things: threats and challenges
    Badr, Youakim
    Zhu, Xiaoyang
    Alraja, Mansour Naser
    [J]. SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2021, 15 (04) : 257 - 271
  • [34] Review on Security and Privacy Concerns in Internet of Things
    Kumar, Nishant
    Madhuri, J.
    ChanneGowda, Manjunath
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON IOT AND ITS APPLICATIONS (IEEE ICIOT), 2017,
  • [35] Security and PrIvacy foR the Internet of Things: an overview of the project
    Aroua, S.
    Champagnat, R.
    Coustaty, M.
    Falquet, G.
    Ghadfi, S.
    Ghamri-Doudane, Y.
    Gomez-Kraemer, P.
    Howells, G.
    McDonald-Maier, K. D.
    Murphy, J.
    Rabah, M.
    Rouis, K.
    Sidere, N.
    Tamani, N.
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC), 2019, : 3993 - 3998
  • [36] Internet of Things (IoT): Security and Privacy Threats
    Shaikh, Eman
    Mohiuddin, Iman
    Manzoor, Ayisha
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [37] Editorial: Security and Privacy Challenges in Internet of Things
    Wang, Ding
    Meng, Weizhi
    [J]. MOBILE NETWORKS & APPLICATIONS, 2022, 27 (01): : 343 - 345
  • [38] Internet of Things : A Study on Security and Privacy Threats
    Husamuddin, Md
    Qayyum, Mohammed
    [J]. 2017 2ND INTERNATIONAL CONFERENCE ON ANTI-CYBER CRIMES (ICACC), 2017, : 93 - 97
  • [39] Enforcing Security, Safety and Privacy for the Internet of Things
    Axelrod, C. Warren
    [J]. 2015 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE (LISAT), 2015,
  • [40] An Overview of Privacy and Security Issues in the Internet of Things
    Medaglia, Carlo Maria
    Serbanati, Alexandru
    [J]. INTERNET OF THINGS-BOOK, 2010, : 389 - 395