Advertisement

Security and Trust in IoT Communications: Role and Impact

  • Keshav KaushikEmail author
  • Kamalpreet Singh
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 989)

Abstract

With the advent of new technologies, many computational devices with sensing and networking power are connected with each other. These devices sense the data from the environment, perform some computation on it, and then either store or transmit the data to some other device having similar capabilities. With this process of communication, there arise several security and trust concerns, which are very critical to handle. Such security and trust concerns can be potential threats to the IoT ecosystem and they need to be handled with the latest architecture, framework, and technology. This paper attempts to highlight some major threats of security and trust in IoT and how existing architecture deals with them.

Keywords

IoT Security Trust TRE Verification and Validation 

References

  1. 1.
    Haldar, V., Chandra, D., Franz, M.: Semantic remote attestation: a virtual machine directed approach to trusted computing. In: USENIX Virtual Machine Research and Technology Symposium (VM 04), pp. 29–41 (2004)Google Scholar
  2. 2.
    Usman, M., Ahmed, I., Aslam, M.I., Khan, S., Sha, U.A.: SIT: a lightweight encryption algorithm for secure internet of things. Int. J. Adv. Comput. Sci. Appl. IJACSA 8(1) (2017)Google Scholar
  3. 3.
    Want, R., Dustdar, S.: Activating the internet of things [guest editors introduction]. Computer 48(9), 16–20 (2015)CrossRefGoogle Scholar
  4. 4.
    Auto-Id Labs. http://www.autoidlabs.org. Accessed 4 Sept 2017
  5. 5.
    TCG. Trusted computing group architecture overview version 1.4 (2006)Google Scholar
  6. 6.
    Simplicio, Jr., M.A., Silva, M.V., Alves, R.C., Shibata, T.K.: Lightweight and escrow-less authenticated key agreement for the internet of things. Comput. Commun. (2016)Google Scholar
  7. 7.
    Karygiannis, T., Eydt, B., Barber, G., Bunn, L., Phillips, T.: Guidelines for securing radio frequency identification (RFID) systems. NIST Spec. Publ. 80, 1–154 (2007)Google Scholar
  8. 8.
    Sakamura, K.: Challenges in the age of ubiquitous computing: a case study of T-engine an open development platform for embedded systems. In: Proceedings of ICSE06, Shanghai, China (2006)Google Scholar
  9. 9.
    The EPCglobal architecture framework, EPCglobal final version 1.3. www.epcglobalinc.org
  10. 10.
    INFSO Networked Enterprise, RFID INFSO G.2 Micro and Nanosystems. In: Co-operation with the Working Group RFID of the ETP EPOSS, Internet of Things in 2020, Roadmap for the Future, Version 1.1, 27 May 2008Google Scholar
  11. 11.
    TCG, TCG Infrastructure Working Group. Architecture part II - integrity management. Specification version 1.0 revision 1.0 (2008)Google Scholar
  12. 12.
    Presser, M., Gluhak, A.: The Internet of Things: connecting the real world with the digital world, EURESCOM mess@ge, The Magazine for Telecom Insiders, vol. 2 (2009). http://www.eurescom.eu/message
  13. 13.
    Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Commun. ACM 28(10), 1030–1044 (1985)CrossRefGoogle Scholar
  14. 14.
    Chen, L., Landfermann, R., Lhr, H., Rohe, M., Sadeghi, A.-R., Stble, Ch., Grtz, H.: A protocol for property-based attestation. In: Proceedings of the First ACM Workshop on Scalable Trusted Computing (STC 06), pp. 7–16 (2006)Google Scholar
  15. 15.
    Sadeghi, A.-R., Stble, Ch.: Property-based attestation for computing platforms: caring about properties, not mechanisms. In: Proceedings of the 2004 Workshop on New Security Paradigms NSPW 04, pp. 67–77 (2004)Google Scholar
  16. 16.
    de Laat, C., Gross, G., Gommans, L., Vollbrecht, J., Spence, D.: Generic AAA Architecture IETF Network Working Group. RFC 2903Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.School of Computer ScienceUPESDehradunIndia

Personalised recommendations