Abstract
Secure and reliable Internet of Things (IoT) presents the main challenges to face for sustainable and efficient IoT ecosystems based on privacy-aware systems. In this paper we present a concise description of such challenges.
This work has been sponsored by European Commission through the FP7-SMARTIE-609062 and the FP7-SOCIOTAL-609112 EU Projects.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
References
Sundmaeker, H., Guillemin, P., Friess, P., Woelffl, S.: Vision and challenges for realising the Internet of Things. Cluster of European Research Projects on the Internet of Things (CERP-IoT) (2010)
Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)
Schonwalder, J., Fouquet, M., Rodosek, G., Hochstatter, I.: Future internet= content+ services+ management. IEEE Commun. Mag. 47(7), 27–33 (2009)
Akin, A., Aysu, A., Ulusel, O.C., Savas, E.: Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single-and multi-message hashing. In: Proceedings of the 3rd International Conference on Security of Information and Networks, pp. 168–177. ACM (2010)
Öztürk, E., Sunar, B., Savaş, E.: Low-power elliptic curve cryptography using scaled modular arithmetic. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 92–106. Springer, Heidelberg (2004)
Ren, K., Lou, W.: A sophisticated privacy-enhanced yet accountable security framework for metropolitan wireless mesh networks. In: The 28th International Conference on Distributed Computing Systems. ICDCS’08, pp. 286–294. IEEE (2008)
Durahim, A.O., Savas, E.: \({\rm A}2\_{\rm MAKE}\): an efficient anonymous and accountable mutual authentication and key agreement protocol for WMNs. Ad Hoc Netw. 9(7), 1202–1220 (2011)
Hwang, J.Y., Lee, S., Chung, B.H., Cho, H.S., Nyang, D.: Short group signatures with controllable linkability. In: 2011 Workshop on Lightweight Security and Privacy: Devices, Protocols and Applications (LightSec), pp. 44–52. IEEE (2011)
Roman, R., Najera, P., Lopez, J.: Securing the Internet of Things. Computer 44(9), 51–58 (2011)
Gudymenko, I., Borcea-Pfitzmann, K., Tietze, K.: Privacy implications of the Internet of Things. In: Wichert, R., Van Laerhoven, K., Gelissen, J. (eds.) AmI 2011. CCIS, vol. 277, pp. 280–286. Springer, Heidelberg (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Skarmeta, A., Moreno, M.V. (2014). Internet of Things. In: Jonker, W., Petković, M. (eds) Secure Data Management. SDM 2013. Lecture Notes in Computer Science(), vol 8425. Springer, Cham. https://doi.org/10.1007/978-3-319-06811-4_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-06811-4_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-06810-7
Online ISBN: 978-3-319-06811-4
eBook Packages: Computer ScienceComputer Science (R0)