Abstract
This paper introduces a scalable secured network and device architecture that enhances IoT devices’ security to reduce the risk of them from becoming a target of attacks. The proposed network and device architecture combines user-definable parameters, information from the physical, network and application layers to generate an encrypted unique identification key to be embedded in the IoT devices. The network architecture uses a WiFi ad-hoc mode that enables the IoT devices to authenticate among themselves during the initial network formation. The IoT devices are only allowed to join an autonomous IoT network if the devices are running the users’ pre-agreed application(s), in the list of permitted devices, and have an unique identification. Both indoor and outdoor field tests were conducted. The results of the field tests showed that the proposed network and device architecture is scalable and is suitable to be deployed for IoT.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Kortuem, G., Kawsar, F., Fitton, D., Sundramoorthy, V.: Smart objects as building blocks for the internet of things. IEEE Internet Computing 14, 44–51 (2010)
Kranz, M., Holleis, P., Schmidt, A.: Embedded interaction: Interacting with the internet of things. IEEE Internet Computing 14, 46–53 (2010)
Atzori, L., Iera, A., Morabito, G.: The internet of things: A survey. Computer Networks 54, 2787–2805 (2010)
Internet of Things (IoT) & Machine-To-Machine (M2M) Communication Market by Technologies & Platforms (RFID, Sensor Nodes, Gateways, Cloud Management, NFC, CEP, SCADA, ZigBee), M2M Connections, IoT Components - Worldwide Market Forecasts (2014 - 2019) (March 2014), marketsandmarkets.com
Sullivan, F.A.: Internet of Things–Technology Penetration and Roadmapping (Technical Insights) (December 31, 2012)
Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, I.: Internet of things: Vision, applications and research challenges. Ad Hoc Networks 10, 1497–1516 (2012)
Weber, R.H.: Internet of Things–New security and privacy challenges. Computer Law & Security Review 26, 23–30 (2010)
Loh, R.C., Kan, W.Y., Kan, S.L.: A User-Controllable Multi-Layer Secure Algorithm for MANET. In: 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 1080–1084 (2012)
Kan, S.L.: Method and system for secured service-oriented nodes discovery and route determination in mobile ad-hoc network (Patent: PCT/SG2009/000032) (2009)
Kan, S.L., Ang, K.W.: Method and System for Securing Wireless Systems and Devices (Patent: 154827) (2007)
Welbourne, E., Battle, L., Cole, G., Gould, K., Rector, K., Raymer, S., et al.: Building the internet of things using RFID: the RFID ecosystem experience. IEEE Internet Computing 13, 48–55 (2009)
Guinard, D., Trifa, V., Karnouskos, S., Spiess, P., Savio, D.: Interacting with the soa-based internet of things: Discovery, query, selection, and on-demand provisioning of web services. IEEE Transactions on Services Computing 3, 223–235 (2010)
Broll, G., Rukzio, E., Paolucci, M., Wagner, M., Schmidt, A., Hussmann, H.: Perci: Pervasive service interaction with the internet of things. IEEE Internet Computing 13, 74–81 (2009)
Zhou, L., Chao, H.-C.: Multimedia traffic security architecture for the internet of things. IEEE Network 25, 35–40 (2011)
Loh, R.C., Kan, S.L.: A Secure Multi-Hop Routing for IoT Communication. Presented at the IEEE World Forum on Internet of Things 2014, Seoul, Korea (2014)
Richardson, T., Stafford-Fraser, Q., Wood, K.R., Hopper, A.: Virtual network computing. IEEE Internet Computing 2, 33–38 (1998)
Hawking Technology: Hi-Gain 15dBi Outdoor Omni-Directional Antenna, http://hawkingtech.com/products/hawking_products/outdoor_wireless_solutions/hao15sip.html
Openmeetings – Open Source Web Conferencing (2006), https://code.google.com/p/openmeetings/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Chze, P.L.R., Leong, K.S., Wee, A.K., Sim, E., May, K.E., Wing, H.S. (2015). Cross-Layer Secured IoT Network and Devices. In: Handa, H., Ishibuchi, H., Ong, YS., Tan, KC. (eds) Proceedings of the 18th Asia Pacific Symposium on Intelligent and Evolutionary Systems - Volume 2. Proceedings in Adaptation, Learning and Optimization, vol 2. Springer, Cham. https://doi.org/10.1007/978-3-319-13356-0_26
Download citation
DOI: https://doi.org/10.1007/978-3-319-13356-0_26
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-13355-3
Online ISBN: 978-3-319-13356-0
eBook Packages: EngineeringEngineering (R0)