Security Enhancement of Internet of Things Using Service Level Agreements and Lightweight Security
In the era of the Internet, people can interconnect and obtain information via the network. Through the combinational use of network and various wireless communication sensing networks, objects can now communicate with each other through the Internet envi
- PDF / 3,848,381 Bytes
- 15 Pages / 439.37 x 666.142 pts Page_size
- 74 Downloads / 185 Views
2
Department of Information Management, Chaoyang University of Technology, Taichung, Taiwan, ROC {scwang,s10614903,s10114901}@cyut.edu.tw Department of Business Administration, Chaoyang University of Technology, Taichung, Taiwan, ROC [email protected]
Abstract. In the era of the Internet, people can interconnect and obtain information via the network. Through the combinational use of network and various wireless communication sensing networks, objects can now communicate with each other through the Internet environment. Furthermore, as IT evolves and as IPv6 technology eventually matures, data transmission can be carried out between smart objects by using sensing networks, networking, and computing functions. This concept which is emerging into a network environment is known as the Internet of Things (IoT). However, the related researches of the IoT have not discussed the data insecurity issues. This study establishes security level agreements to ameliorate excessive computational loads with the lightweight security mechanism so that data can be protected in the perception layer, then the computational cost of data encrypted in the perception layer. Keywords: Internet of Things
Security level agreements Digital signature
1 Introduction Currently, computation capability and storage capacity of end devices are developing rapidly; the end devices have gradually become portable mobile devices. In addition, as a result of the vigorous development of information and network technology, the network types are more diversified, such as Wireless Network, Wireless Sensor Network, etc. The network environment has become ubiquitous; it is also always connected. Network patterns have evolved from the Internet of People to the Internet of Things (IoT) [4]. The IoT concept was first proposed in 1999 by Kevin Ashton. It was based on RFID (Radio Frequency Identification) technology and was proposed in Massachusetts Institute of Technology [5]. Through RFID technology, all objects were interconnected via a network, and smart identification and management could be implemented. Sensing devices, such as RFID, Zigbee, IR (Infrared), GPS (Global Positioning System), WiFi and UMTS (Universal Mobile Telecommunications System) devices are © Springer Nature Switzerland AG 2019 K. Arai et al. (Eds.): FICC 2018, AISC 887, pp. 221–235, 2019. https://doi.org/10.1007/978-3-030-03405-4_15
222
S.-C. Wang et al.
now connected via the Internet. They carry out information exchange and communication based on different protocols. Furthermore, intelligent identification, positioning, tracking, monitoring and management [16, 17] are implemented. These objects can be operated and can perform data exchange remotely [23]. Hence, development of the IoT is no longer limited to the RFID technical scope [3, 11, 18, 25]. In the IoT, there are thousands of different types of sense devices. Therefore, the IoT will form a more complex entity subject to a deluge of data and the security of IoT must to be considered. In this study, a discussion on the security o
Data Loading...