Feasibility of Societal Model for Securing Internet of Things

被引:0
|
作者
Tsunoda, Hiroshi [1 ]
Roman, Rodrigo [2 ]
Lopez, Javier [2 ]
Keeni, Glenn Mansfield [3 ]
机构
[1] Tohoku Inst Technol, Fac Engn, Sendai, Miyagi 9828577, Japan
[2] Univ Malaga, Network Informat & Comp Secur NICS Lab, E-29071 Malaga, Spain
[3] Cyber Solut Inc, Sendai, Miyagi 9893204, Japan
关键词
Internet of Things; security; operational model; network architecture; SNMP; ARCHITECTURE; NETWORKS; PRIVACY; TRUST;
D O I
10.3837/tiis.2018.08.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the Internet of Things (IoT) concept, devices communicate autonomously with applications in the Internet. A significant aspect of IoT that makes it stand apart from present-day networked devices and applications is a) the very large number of devices, produced by diverse makers and used by an even more diverse group of users; b) the applications residing and functioning in what were very private sanctums of life e.g. the car, home, and the people themselves. Since these diverse devices require high-level security, an operational model for an IoT system is required, which has built-in security. We have proposed the societal model as a simple operational model. The basic concept of the model is borrowed from human society there will be infants, the weak and the handicapped who need to be protected by guardians. This natural security mechanism works very well for IoT networks which seem to have inherently weak security mechanisms. In this paper, we discuss the requirements of the societal model and examine its feasibility by doing a proof-of-concept implementation.
引用
收藏
页码:3567 / 3588
页数:22
相关论文
共 50 条
  • [1] Feasibility of Societal Model for Securing Internet of Things
    Tsunoda, Hiroshi
    Keeni, Glenn Mansfield
    [J]. 2017 13TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2017, : 541 - 546
  • [2] Securing the internet of things
    [J]. Lowne, Alan, 1600, Omeda (58):
  • [3] Securing the Internet of Things
    Roman, Rodrigo
    Najera, Pablo
    Lopez, Javier
    [J]. COMPUTER, 2011, 44 (09) : 51 - 58
  • [4] Securing Things in the Healthcare Internet of Things
    MacDermott, Aine
    Kendrick, Phillip
    Idowu, Ibrahim
    Ashall, Mal
    Shi, Qi
    [J]. 2019 GLOBAL IOT SUMMIT (GIOTS), 2019,
  • [5] Challenges to Securing the Internet of Things
    Stout, William M. S.
    Urias, Vincent E.
    [J]. 2016 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2016, : 1 - 8
  • [6] Securing the Internet of Things (IoT)
    El bekkali, Abla
    Boulmalf, Mohammed
    Essaaidi, Mohammad
    Mezzour, Ghita
    [J]. 2018 6TH INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2018, : 211 - 216
  • [7] Securing Internet-of-Things
    Gong, Guang
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2018, 2019, 11358 : 3 - 16
  • [8] Congestion control model for securing internet of things data flow
    Quwaider, Muhannad
    Shatnawi, Yousef
    [J]. AD HOC NETWORKS, 2020, 106
  • [9] Securing the Internet of Things in a Quantum World
    Cheng, Chi
    Lu, Rongxing
    Petzoldt, Albrecht
    Takagi, Tsuyoshi
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (02) : 116 - 120
  • [10] The embedded framework for securing the Internet of Things
    Khan, Feroz A. B.
    Anandharaj, G.
    [J]. JOURNAL OF ENGINEERING RESEARCH, 2021, 9 (02): : 139 - 148