PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Secure gateway for Internet of Things with internal AAA mechanism

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
In this paper, we describe secure gateway for Internet of Things (IoT) devices with internal AAA mechanism, implemented to connect IoT sensors with Internet users. Secure gateway described in this paper allows to (1) authenticate each connected device, (2) authorise connection or reconguration performed by the device and (3) account each action. The same applies to Internet users who want to connect, download data from or upload data to an IoT device. Secure Gateway with internal AAA mechanism could be used in Smart Cities environments and in other IoT deployments where security is a critical concern. The mechanism presented in this paper is a new concept and has been practically validated in Polish national research network PL-LAB2020.
Rocznik
Strony
17--35
Opis fizyczny
Bibliogr. 28 poz., rys.
Twórcy
autor
  • Institute of Informatics Silesian University of Technology Akademicka 16, 44-100 Gliwice, Poland
autor
  • Institute of Informatics Silesian University of Technology Akademicka 16, 44-100 Gliwice, Poland
Bibliografia
  • [1] C. G. Weissman. Survey: We asked executives about the Internet Of Things and their answers reveal that security remains a huge concern. http://www.businessinsider.in/We-Asked-Executives-About-The-Internet-Of-Things-And-Their-Answers-Reveal-That-Security-Remains-A-Huge-Concern/articleshow/45959921.cms, Accessed: 20.10.2015.
  • [2] J. Steinberg. These devices may be spying on you (even in your own home). http://www.forbes.com/sites/josephsteinberg/2014/01/27/these-devices-may-be-spying-on-you-even-in-your-own-home, Accessed: 20.10.2015.
  • [3] A. Greenberg. Hackers remotely kill a jeep on the highway|with me in it. http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/, Accessed: 20.10.2015.
  • [4] A. Charlton. BMW ConnectedDrive hack sees 2.2 million cars exposed to remote unlocking. http://www.ibtimes.co.uk/bmw-connecteddrive-hack-sees-2-2-million-cars-exposed-remote-unlocking-1486215,Accessed: 20.10.2015.
  • [5] I. Foster, A. Prudhomme, K. Koscher, and S. Savage. Fast and vulnerable: A story of telematic failures. In Proceedings of the 9th USENIX Conference on Offensive Technologies,pages 15-15. USENIX Association, 2015.
  • [6] Horizon 2020. Work Programme 2016-17. European Commission Decision C (2015)6776 of 13 October 2015.
  • [7] SmartSantander Projetct. http://www.smartsantander.eu/, Accessed 20.10.2015.33 Secure gateway for Internet of Things with internal AAA mechanism (18 of 19)
  • [8] SmartSantander Infrastructure overview. Accessed 20.10.2015.
  • [9] PL-LAB2020 - infrastructure for research,. http://www.pllab.pl/ [accessed 20.04.2017].
  • [10] A. Brachman. RPL Objective Function Impact on LLNs Topology and Performance, pages 340-351. Springer Berlin Heidelberg, 2013. DOI: 10.1007/978-3-642-40316-3 30.
  • [11] Y. Yu, L. J. Rittle, V. Bhandari, and J. B. LeBrun. Supporting concurrent applications in wireless sensor networks. In Proceedings of the 4th International Conference on Embedded Networked Sensor Systems, pages 139-152. ACM, 2006. 10.1145/1182807.1182822.
  • [12] A. Brachman. Simulation Comparison of LEACH-Based Routing Protocols for Wireless Sensor Networks, pages 105-113. Springer Berlin Heidelberg, 2013. 10.1007/978-3-642-38865-1 12.
  • [13] D. Samociuk. Secure communication between OpenFlow switches and controllers. In Proceedings of the 4th International Conference on Advances in Future Internet, pages 32-37.IARIA XPS Press, 2015.
  • [14] M. Maróti, B. Kusy, G. Simon, and A. Ledeczi. The flooding time synchronization protocol.In Proceedings of the 2nd international conference on Embedded networked sensor systems, pages 39-49. ACM, 2004. 10.1145/1031495.1031501.
  • [15] B. Chen, G. Peterson, G. Mainland, and M. Welsh. LiveNet: Using Passive Monitoring to Reconstruct Sensor Network Dynamics, pages 79-98. Springer Berlin Heidelberg, 2008.
  • 10.1007/978-3-540-69170-9 6.
  • [16] J. A. Stankovic. Research directions for the Internet of Things. IEEE Internet of Things Journal, 1(1):3-9, 2014. 10.1109/JIOT.2014.2312291.
  • [17] M. Kozielski, M. Sikora, and L. Wróbel. DISESOR - decision support system for mining industry. In 2015 Federated Conference on Computer Science and Information Systems (FedCSIS), pages 67-74, 2015. 10.15439/2015F168.
  • [18] D. Evans. The Internet of Things how the next evolution of the internet is changing everything (april 2011). White Paper by Cisco Internet Business Solutions Group (IBSG),2012.
  • [19] T. R. Abdelzaher, S. Prabh, and R. Kiran. On real-time capacity limits of multihop wireless sensor networks. In 25th IEEE International Real-Time Systems Symposium, pages 359-370,2004. 10.1109/REAL.2004.37.
  • [20] T. He, J. A. Stankovic, T. F. Abdelzaher, and C. Lu. A spatiotemporal communication protocol for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems,16(10):995-1006, 2005. 10.1109/TPDS.2005.116.
  • [21] S. Ravi, A. Raghunathan, and S. Chakradhar. Tamper resistance mechanisms for secure embedded systems. In 17th International Conference on VLSI Design. Proceedings., pages 605-611, 2004. 10.1109/ICVD.2004.1260985.
  • [22] W. Xu, W. Trappe, Y. Zhang, and T. Wood. The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pages 46-57. ACM, 2005.10.1145/1062689.1062697.
  • [23] A. Gruca, K. Harezlak, and P. Kasprowski. Application of Dimensionality Reduction Methods for Eye Movement Data Classification, pages 291-303. Springer International Publishing,2016. 10.1007/978-3-319-23437-3 25.
  • [24] Z. W. Kong, B. Y. Ooi, and C. S. Wong. Storage Performance Evaluation for IoT Gateway Implementation Using Raspberry Pi 2. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 8(4):7-10, 2016.
  • [25] N. Saxena, A. Roy, B. J. R. Sahu, and H. Kim. Efficient IoT Gateway over 5G Wireless: A New Design with Prototype and Implementation Results. IEEE Communications Magazine, 55(2):97-105, 2017. 10.1109/MCOM.2017.1600437CM.
  • [26] T. Dierks and S. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.2, 2008.
  • [27] C. Adams and S. Farrell. Internet X. 509 Public key Infrastructure. IETF RFC2510, 1999.
  • [28] OWASP Internet of Things (IoT) Project. https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project, Accessed: 20.10.2015.
Uwagi
PL
Opracowanie ze środków MNiSW w ramach umowy 812/P-DUN/2016 na działalność upowszechniającą naukę (zadania 2017).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-83e30ed8-4b0e-48bc-9865-45bf43ae4fe2
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.