Interoperability of Security-Enabled Internet of Things
- 3.3k Downloads
The future Internet will embrace the intelligence of Web 3.0 and the omnipresence of every day connected objects. The later was envisioned as the Internet of Things. Security and interoperability concerns are hindering the service innovations using the Internet of Things. This paper addresses secure access provision to Internet of Things-enabled services and interoperability of security attributes between different administrative domains. In this paper we proposed a layered architecture of Internet of Things framework where a semantically enhanced overlay interlink the other layers and facilitate secure access provision to Internet of Things-enabled services. The main element of semantic overlay is security reasoning through ontologies and semantic rules. Finally the interoperability of security aspect is addressed through ontology and a machine-to-machine platform. This paper provides implementation details of security reasoning and the interoperability aspects and discusses crucial challenges in these areas.
KeywordsInternet of Things Ontology Security Semantics Reasoning
This article is distributed under the terms of the Creative Commons Attribution Noncommercial License which permits any noncommercial use, distribution, and reproduction in any medium, provided the original author(s) and source are credited.
- 1.pilot SHIELD (2011). Pilot embedded Systems arcHItecturE for multi-Layer Dependable solutions [online]. available: http://www.pshield.eu.
- 2.Tim Berners-Lee J. H., Lassila O. (2001) The semantic web. Scientific American Magazine, New YorkGoogle Scholar
- 3.Walter, K. D. (2009). Implementing M2M applications via GPRS, EDGE and UMTS. White paper—M2M Alliance.Google Scholar
- 4.ETSI: Ts 102.690 machine-to-machine communications (M2M); M2M functional architecture (Stable draft, June 2011).Google Scholar
- 5.Bell M. (2008) Service-oriented modeling (SOA): Service analysis, design, and architecture. Wiley, LondonGoogle Scholar
- 6.Mili, H., Elkharraz, E., & Mcheick, H. (2004). Understanding separation of concerns. Proceedings of the Workshop on Early Aspects—Aspect Oriented Software Development (AOSD).Google Scholar
- 7.Sensor model language (SensorML). (2005). [online] available: http://www.opengeospatial.org/standards/sensorml.
- 8.Akerkar R., Sajja P. (2010) Knowledge-based systems. Jones & Barlett Publishers, MA, USAGoogle Scholar
- 10.Michael, K., Smith, C. W., & Mcguinness, D. L. (2004). Owl web ontology language guide (W3C Recommendation, February 2004).Google Scholar
- 11.The protégé ontology editor. [online] (Available: http://protege.stanford.edu/ [accessed on 01. March 2011]).
- 12.Horrocks, I., Patel-Schneider, P. F., Boley, H., Tabet, S., Grosof, B., & Dean, M. (2004). SWRL: A semantic web rule language combining OWL and RuleML. W3C Member Submission.Google Scholar
- 13.OConnor, M., & Das, A. (2009). SQWRL: A query language for OWL. Proceedings of OWL: Experiences and Directions (OWLED), the fifth International Workshop.Google Scholar
- 14.Friedman-Hill, E. Jess, the rule engine for the java platform [online]. available: http://www.jessrules.com/.
- 15.Nike + running shoes and a nike + ipod sport kit or sensor. [online] (Available: http://www.apple.com/ipod/nike/).
- 17.Adida, B., Birbeck, M. (2008). RDFa primer: Bridging the human and data webs [online]. available: http://www.w3.org/TR/xhtml-rdfa-primer/.
- 18.Ostermaier, B., Romer, K., Mattern, F., Fahrmair, M., & Kellerer, W. (2010). A real-time search engine for the Web of Things. Proceedings of Internet of Things 2010, pp. 1–8.Google Scholar
- 19.Chowdhury M. M. R., Alam S., Noll J. (2009) Secure connected home: Where the semantic technologies meet the device community. Journal of Information Assurance and Security (JIAS) 4(5): 390–402Google Scholar