Skip to main content

Security Enhancement of Internet of Things Using Service Level Agreements and Lightweight Security

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 887))

Abstract

In the era of the Internet, people can interconnect and obtain information via the network. Through the combinational use of network and various wireless communication sensing networks, objects can now communicate with each other through the Internet environment. Furthermore, as IT evolves and as IPv6 technology eventually matures, data transmission can be carried out between smart objects by using sensing networks, networking, and computing functions. This concept which is emerging into a network environment is known as the Internet of Things (IoT). However, the related researches of the IoT have not discussed the data insecurity issues. This study establishes security level agreements to ameliorate excessive computational loads with the lightweight security mechanism so that data can be protected in the perception layer, then the computational cost of data encrypted in the perception layer.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Andrieux, A., Karl, C., Dan, A., Keahey, K., Ludwig, H., Nakata, T., Pruyne, J., Rofrano, J., Tuecke, S., Xu, M.: Web services agreement specification (WS-agreement). In: Open Grid Forum, vol. 128 (2007)

    Google Scholar 

  2. Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)

    Article  Google Scholar 

  3. Chan, H., Perrig, A.: PIKE: peer intermediaries for key establishment in sensor networks. In: Proceeding of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 1, pp. 524–535 (2005)

    Google Scholar 

  4. Coetzee, L., Eksteen, J.: The internet of things-promise for the future an introduction. In: Proceedings of IST-Africa Conference, pp. 1–9 (2011)

    Google Scholar 

  5. Gavras, A., Karila, A., Fdida, S., May, M., Potts, M.: Future internet research and experimentation: the fire initiative. ACM SIGCOMM Comput. Commun. Rev. 37(3), 89–92 (2007)

    Article  Google Scholar 

  6. Gershenfeld, N., Krikorian, R., Cohen, D.: The internet of things. Sci. Am. 291, 76–81 (2004)

    Article  Google Scholar 

  7. He, M., Ren, C., Wang, Q., Shao, B., Dong, J.: The internet of things as an enabler to supply chain innovation. In: Proceedings of the International Conference on e-Business Engineering (ICEBE), pp. 326–331 (2010)

    Google Scholar 

  8. Henning, R.R.: Security service level agreements: quantifiable security for the enterprise? In: Proceeding of the ACM Workshop on New Security Paradigms, pp. 54–60 (1999)

    Google Scholar 

  9. ITU Internet Reports: The Internet of Things. International Telecommunication Union, Geneva (2005)

    Google Scholar 

  10. Jara, A.J., Zamora, M.A., Skarmeta, A.: Global IP: an adaptive and transparent ipv6 integration in the internet of things. In: Proceedings of the Mobile Information Systems, vol. 8, no. 3, pp. 177–197 (2012)

    Google Scholar 

  11. Lee, H., Kim, Y.H., Lee, D.H., Lim, J.: Classification of key management schemes for wireless sensor networks. In: Proceeding of the International Workshop on Application and Security Service in Web and PervAsive eNvironments, vol. 4537, pp. 664–673 (2007)

    Google Scholar 

  12. Lin, M., Zhang, J.: The application and development of internet of things with its solutions of restrictive factors. In: Proceedings of the International Conference on Mechatronic Science, Electric Engineering and Computer (MEC), pp. 282–285 (2011)

    Google Scholar 

  13. Lu, T., Neng, W.: Future internet: the internet of things. In: Proceedings of the International Conference on Advanced Computer Theory and Engineering, vol. 5, pp. 376–380 (2010)

    Google Scholar 

  14. Luigi, A., Antonio, I., Giacomo, M.: The internet of things: a survey. Comput. Netw. 54, 2787–2805 (2010)

    Article  Google Scholar 

  15. Luna, J., Ghani, H., Vateva, T., Suri, N.: Quantitative assessment of cloud security level agreements: a case study. In: Proceedings of Security and Cryptography, pp. 64–73 (2012)

    Google Scholar 

  16. Perrig, A., Szewczyk, R., Wen, V., Cullar, D., Tygar, J.D.: SPINS: security protocols for sensor networks. Wirel. Netw. 8(5), 521–534 (2002)

    Article  Google Scholar 

  17. Sarma, A.C., João, J.: Identities in the future internet of things. Wirel. Pers. Commun. 49(3), 353–363 (2009)

    Article  Google Scholar 

  18. Sarma, S.E., Weis, S.A., Engels, D.W.: RFID systems and security and privacy implications. In: Proceeding of the 4th International Workshop on Cryptographic Hardware and Embedded Systems, pp. 454–469 (2002)

    Google Scholar 

  19. Schoenen, R., Walke, B.H.: On PHY and MAC performance of 3G-LTE in a multi-hop cellular environment. In: Proceeding of the International Conference on Wireless Communications, Networking and Mobile Computing, pp. 926–929 (2007)

    Google Scholar 

  20. Wang, B.: Review on internet of things. J. Electron. Meas. Instrum. 23(12), 1–7 (2009)

    Google Scholar 

  21. Wang, S.C., Chen, C.W., Wang, S.S., Yan, K.Q.: To achieve data availability and reliability by a middleware framework underlying the IoT environment. In: BAI2013 International Conference on Business and Information, Bali, Indonesia, pp. E24–E31, 07–09 July 2013

    Google Scholar 

  22. Welbourne, E., Battle, L., Cole, G., Gould, K., Rector, K., Raymer, S., Balazinska, M., Borriello, G.: Building the internet of things using RFID: the RFID ecosystem experience. In: Proceedings of the IEEE Internet Computing, vol. 13, no. 3, pp. 48–55 (2009)

    Google Scholar 

  23. Xue, Y., Zhihua, L., Zhenmin, G., Haitao, Z.: A multi-layer security model for internet of things. In: Internet of Things. Communications in Computer and Information Science, vol. 312, pp 388–393 (2012)

    Google Scholar 

  24. Yen, S.P., Talwar, S., Lee, S.C., Kim, H.: WiMax femtocells: a perspective on network architecture, capacity, and coverage. IEEE Commun. Mag. 46(10), 58–65 (2008)

    Article  Google Scholar 

  25. Zhou, Q., Zhang, J.: Research prospect of internet of things geography. In: Proceeding of the 19th International Conference on Geoinformatics, pp. 1–5 (2011)

    Google Scholar 

  26. Dekker, M., Hogben, G.: Survey and analysis of security parameters in cloud SLAs across the european public sector. European Union Agency for Network and Information Security. https://www.enisa.europa.eu/activities/Resilience-and-CIIP/cloud-computing/survey-and-analysis-of-security-parameters-in-cloud-slas-across-the-european-public-sector

  27. IBM: Smarter planet-United States. http://www.ibm.com/smarterplanet/us/en/

Download references

Acknowledgment

The authors like to thank the Ministry of Science and Technology, ROC (MOST-106-2221-E-324 -009) to support this research.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kuo-Qin Yan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, SC., Lin, YJ., Yan, KQ., Chen, CW. (2019). Security Enhancement of Internet of Things Using Service Level Agreements and Lightweight Security. In: Arai, K., Kapoor, S., Bhatia, R. (eds) Advances in Information and Communication Networks. FICC 2018. Advances in Intelligent Systems and Computing, vol 887. Springer, Cham. https://doi.org/10.1007/978-3-030-03405-4_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-03405-4_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-03404-7

  • Online ISBN: 978-3-030-03405-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics