Holistic Security Architecture for IoT Technologies

被引:0
|
作者
Mbanaso, U. M. [1 ]
Chukwudebe, G. A. [2 ]
Adebisi, B. [3 ]
机构
[1] Nasarawa Univ, Ctr Cyberspace Studies, Keffi, Nasarawa State, Nigeria
[2] Fed Univ Technol Owerri, Dept Elect & Elect Engn, Owerri, Nigeria
[3] Manchester Metropolitan Univ, Sch Engn, Manchester M1 5DG, Lancs, England
关键词
Internet of Things; security; trust; confidentiality; privacy; cyberspace and Internet; cybersecurity; PRIVACY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper proposes a conceptual Holistic Security Architecture for addressing the trust, confidentiality and privacy issues in Internet of Things (IoT). The novelty of IoT is their ability to increasingly perform automated tasks in a way that was never envisaged. However, security and safety issues have been identified as key areas of huge concerns. This is not a surprise; as a disruptive technology, IoT come with inherent vulnerability and threats like most other computing systems. Its impact on everyday life, would obviously have a far-reaching devastating consequences when its security is breached or compromised. Providing end-to-end security and safety is an important critical success factor and assurance to sustain IoT' s benefits. Arguably, trust, confidentiality and privacy combined; connote one such layer of IoT security architecture. We provide a novel design with a configurable policy-based architecture that can scale proportionately in solving trust, confidentiality and privacy concerns simultaneously in distributed security domains. The architecture proposes a mechanism for negotiated release of provable attributes and resources, especially when devices have the capabilities and requirements to share data as well as collaborate in solving problems.
引用
收藏
页数:6
相关论文
共 50 条
  • [11] Application of IOT Technologies in Campus Security System
    Wang Xiuping
    COMPUTATIONAL MATERIALS SCIENCE, PTS 1-3, 2011, 268-270 : 1884 - 1887
  • [12] Architecture of Smart Department based on IoT Technologies
    Devyatkin, Aleksey, V
    Pankratev, Denis A.
    Serykh, Elena, V
    2020 9TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2020, : 164 - 167
  • [13] Industrial IoT Monitoring: Technologies and Architecture Proposal
    Raposo, Duarte
    Rodrigues, Andre
    Sinche, Soraya
    Silva, Jorge Sa
    Boavida, Fernando
    SENSORS, 2018, 18 (10)
  • [14] Home Automation Architecture based on IoT Technologies
    Costa, Judson
    Araujo, Daniel
    Silva, Diego R. C.
    Nogueira, Marcelo B.
    Rodrigues, Marconi C.
    2018 IEEE INTERNATIONAL WORKSHOP ON METROLOGY FOR INDUSTRY 4.0 AND IOT (METROIND4.0&IOT), 2018, : 63 - 67
  • [15] IoT based Smart home : Security Aspects and security architecture
    Ray, Abhay Kumar
    Bagwari, Ashish
    2020 IEEE 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2020), 2020, : 218 - 222
  • [16] SDN based architecture for IoT and improvement of the security
    Flauzac, Olivier
    Gonzalez, Carlos
    Hachani, Abdelhak
    Nolot, Florent
    2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS WAINA 2015, 2015, : 688 - 693
  • [17] Building a Unified Middleware Architecture for Security in IoT
    Vulpe, Alexandru
    Arseni, Stefan-Ciprian
    Marcu, Ioana
    Voicu, Carmen
    Fratu, Octavian
    RECENT ADVANCES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 2, 2017, 570 : 105 - 114
  • [18] On the Security of the 5G-IoT Architecture
    Rahimi, Hamed
    Zibaeenejad, Ali
    Rajabzadeh, Parsa
    Safavi, Ali Akbar
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SMART CITIES AND INTERNET OF THINGS (SCIOT'18), 2018,
  • [19] Hardware-Security Technologies for Industrial IoT: TrustZone and Security Controller
    Lesjak, Christian
    Hein, Daniel
    Winter, Johannes
    IECON 2015 - 41ST ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2015, : 2589 - 2595
  • [20] Holistic Survey on Security in IoT Application Layer: Attacks, Protocols, and Applications
    Kumari, N. Sharmila
    Vimala, H. S.
    Pruthvi, C. N.
    Shreyas, J.
    IEEE ACCESS, 2024, 12 : 186957 - 187014