Skip to main content

Multi-layer Security Mechanism for Networked Embedded Devices

  • Conference paper
  • First Online:
Ubiquitous Computing and Ambient Intelligence (UCAmI 2017)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10586))

  • 2420 Accesses

Abstract

Networked embedded systems are impacting the way we interact with the world around us. They are at the core of the advancements in information and communication technologies which have been driving the fourth generation revolution in today’s industry and networks. This technology allows for better integrated communications, integrated local and global control, supervision and maintenance. Billions of smart devices are being implemented - from smart TVs and cars to other smart health monitors and wearable technologies and this resulted in the development of smart interconnected environments. The core vision of the aforementioned smart interconnected environment is the realization of a reliable and secure two way communication between smart devices. However, the high level of heterogeneity, coupled with the wide scale of smart embedded systems, has magnified the security threats. Traditional security countermeasures and privacy cannot be enforced directly on such systems due to their limited computing capabilities and their diverse set of hardware architectures. In this paper we are proposing a multi-level security approach for smart interconnected environments/networks. We address the security at three main pillars: application level, system level, and network level.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cao, J., Carminati, B., Ferrari, E., Tan, K.L.: CASTLE: continuously anonymizing data streams. IEEE Trans. Depend. Secur. Comput 8(3), 337–352 (2011)

    Article  Google Scholar 

  2. Evans, D., Eyers, D.M.: Efficient data tagging for managing privacy in the internet of things. In: 2012 IEEE International Conference on Green Computing and Communications (GreenCom), pp. 244–248. IEEE (2012)

    Google Scholar 

  3. Huang, X., Fu, R., Chen, B., Zhang, T., Roscoe, A.: User interactive internet of things privacy preserved access control. In: 2012 International Conference on Internet Technology and Secured Transactions, pp. 597–602. IEEE (2012)

    Google Scholar 

  4. Kothmayr, T., Schmitt, C., Hu, W., Brünig, M., Carle, G.: DTLS based security and two-way authentication for the internet of things. Ad Hoc Netw. 11(8), 2710–2723 (2013)

    Article  Google Scholar 

  5. Liu, T., Guan, Y.W., Yan, Y.Q., Liu, L., Deng, Q.C.: A WSN-oriented key agreement protocol in internet of things. In: Applied Mechanics and Materials. vol. 401, pp. 1792–1795. Trans Tech Publications (2013)

    Google Scholar 

  6. Martinez-Julia, P., Skarmeta, A.F.: Beyond the separation of identifier and locator: building an identity-based overlay network architecture for the future internet. Comput. Netw. 57(10), 2280–2300 (2013)

    Article  Google Scholar 

  7. Piro, G., Boggia, G., Grieco, L.A.: A standard compliant security framework for IEEE 802.15.4 networks. In: 2014 IEEE World Forum on Internet of Things (WF-IoT), pp. 27–30. IEEE (2014)

    Google Scholar 

  8. Roman, R., Alcaraz, C., Lopez, J., Sklavos, N.: Key management systems forsensor networks in the context of the internet of things. Comput. Electr. Eng. 37(2), 147–159 (2011)

    Article  Google Scholar 

  9. Schaller, A., Arul, T., van der Leest, V., Katzenbeisser, S.: Lightweight anti-counterfeiting solution for low-end commodity hardware using inherent PUFs. In: Holz, T., Ioannidis, S. (eds.) Trust 2014. LNCS, vol. 8564, pp. 83–100. Springer, Cham (2014). doi:10.1007/978-3-319-08593-7_6

    Google Scholar 

  10. Wang, Y., Wen, Q.: A privacy enhanced DNS scheme for the internet of things. In: IET International Conference on Communication Technology and Application (ICCTA 2011), pp. 699–702. IET (2011)

    Google Scholar 

  11. Evans, D., Eyers, D.M.: Efficient data tagging for managing privacy in the internet of things. Chin. J. Comput. 34(8), 1351–1364 (2011)

    Article  Google Scholar 

  12. Yang, J., Fang, B.: Security model and key technologies for the internet of things. J. China Univ. Posts Telecommun. 18, 109–112 (2011)

    Article  Google Scholar 

  13. York, K.: Dyn statement on 10/21/2016 DDoS attack (2016). http://dyn.com/blog/dyn-statement-on-10212016-DdoS-attack/

  14. Zhao, Y.L.: Research on data security technology in internet of things. In: Applied Mechanics and Materials, vol. 433, pp. 1752–1755. Trans Tech Publications (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Christopher Mansour .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Mansour, C., Chasaki, D. (2017). Multi-layer Security Mechanism for Networked Embedded Devices. In: Ochoa, S., Singh, P., Bravo, J. (eds) Ubiquitous Computing and Ambient Intelligence. UCAmI 2017. Lecture Notes in Computer Science(), vol 10586. Springer, Cham. https://doi.org/10.1007/978-3-319-67585-5_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-67585-5_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-67584-8

  • Online ISBN: 978-3-319-67585-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics