Wireless Personal Communications

, Volume 61, Issue 3, pp 567–586 | Cite as

Interoperability of Security-Enabled Internet of Things

  • Sarfraz Alam
  • Mohammad M. R. Chowdhury
  • Josef Noll
Open Access


The future Internet will embrace the intelligence of Web 3.0 and the omnipresence of every day connected objects. The later was envisioned as the Internet of Things. Security and interoperability concerns are hindering the service innovations using the Internet of Things. This paper addresses secure access provision to Internet of Things-enabled services and interoperability of security attributes between different administrative domains. In this paper we proposed a layered architecture of Internet of Things framework where a semantically enhanced overlay interlink the other layers and facilitate secure access provision to Internet of Things-enabled services. The main element of semantic overlay is security reasoning through ontologies and semantic rules. Finally the interoperability of security aspect is addressed through ontology and a machine-to-machine platform. This paper provides implementation details of security reasoning and the interoperability aspects and discusses crucial challenges in these areas.


Internet of Things Ontology Security Semantics Reasoning 


Open Access

This article is distributed under the terms of the Creative Commons Attribution Noncommercial License which permits any noncommercial use, distribution, and reproduction in any medium, provided the original author(s) and source are credited.


  1. 1.
    pilot SHIELD (2011). Pilot embedded Systems arcHItecturE for multi-Layer Dependable solutions [online]. available:
  2. 2.
    Tim Berners-Lee J. H., Lassila O. (2001) The semantic web. Scientific American Magazine, New YorkGoogle Scholar
  3. 3.
    Walter, K. D. (2009). Implementing M2M applications via GPRS, EDGE and UMTS. White paper—M2M Alliance.Google Scholar
  4. 4.
    ETSI: Ts 102.690 machine-to-machine communications (M2M); M2M functional architecture (Stable draft, June 2011).Google Scholar
  5. 5.
    Bell M. (2008) Service-oriented modeling (SOA): Service analysis, design, and architecture. Wiley, LondonGoogle Scholar
  6. 6.
    Mili, H., Elkharraz, E., & Mcheick, H. (2004). Understanding separation of concerns. Proceedings of the Workshop on Early Aspects—Aspect Oriented Software Development (AOSD).Google Scholar
  7. 7.
    Sensor model language (SensorML). (2005). [online] available:
  8. 8.
    Akerkar R., Sajja P. (2010) Knowledge-based systems. Jones & Barlett Publishers, MA, USAGoogle Scholar
  9. 9.
    John Davies R. S., Warren P. (2006) Semantic web technologies: Trends and research in ontology-based systems. Wiley, LondonCrossRefGoogle Scholar
  10. 10.
    Michael, K., Smith, C. W., & Mcguinness, D. L. (2004). Owl web ontology language guide (W3C Recommendation, February 2004).Google Scholar
  11. 11.
    The protégé ontology editor. [online] (Available: [accessed on 01. March 2011]).
  12. 12.
    Horrocks, I., Patel-Schneider, P. F., Boley, H., Tabet, S., Grosof, B., & Dean, M. (2004). SWRL: A semantic web rule language combining OWL and RuleML. W3C Member Submission.Google Scholar
  13. 13.
    OConnor, M., & Das, A. (2009). SQWRL: A query language for OWL. Proceedings of OWL: Experiences and Directions (OWLED), the fifth International Workshop.Google Scholar
  14. 14.
    Friedman-Hill, E. Jess, the rule engine for the java platform [online]. available:
  15. 15.
    Nike + running shoes and a nike + ipod sport kit or sensor. [online] (Available:
  16. 16.
    Khare R. (2006) Microformats: The next (small) thing on the semantic web?. Internet Computing 10(1): 68–75CrossRefGoogle Scholar
  17. 17.
    Adida, B., Birbeck, M. (2008). RDFa primer: Bridging the human and data webs [online]. available:
  18. 18.
    Ostermaier, B., Romer, K., Mattern, F., Fahrmair, M., & Kellerer, W. (2010). A real-time search engine for the Web of Things. Proceedings of Internet of Things 2010, pp. 1–8.Google Scholar
  19. 19.
    Chowdhury M. M. R., Alam S., Noll J. (2009) Secure connected home: Where the semantic technologies meet the device community. Journal of Information Assurance and Security (JIAS) 4(5): 390–402Google Scholar

Copyright information

© The Author(s) 2011

Authors and Affiliations

  • Sarfraz Alam
    • 1
    • 2
  • Mohammad M. R. Chowdhury
    • 1
    • 2
  • Josef Noll
    • 1
    • 3
  1. 1.University of OsloKjellerNorway
  2. 2.UNIKKjellerNorway
  3. 3.Center for Wireless Innovation NorwayOsloNorway

Personalised recommendations