Skip to main content

Cross-Layer Secured IoT Network and Devices

  • Conference paper

Part of the book series: Proceedings in Adaptation, Learning and Optimization ((PALO,volume 2))

Abstract

This paper introduces a scalable secured network and device architecture that enhances IoT devices’ security to reduce the risk of them from becoming a target of attacks. The proposed network and device architecture combines user-definable parameters, information from the physical, network and application layers to generate an encrypted unique identification key to be embedded in the IoT devices. The network architecture uses a WiFi ad-hoc mode that enables the IoT devices to authenticate among themselves during the initial network formation. The IoT devices are only allowed to join an autonomous IoT network if the devices are running the users’ pre-agreed application(s), in the list of permitted devices, and have an unique identification. Both indoor and outdoor field tests were conducted. The results of the field tests showed that the proposed network and device architecture is scalable and is suitable to be deployed for IoT.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kortuem, G., Kawsar, F., Fitton, D., Sundramoorthy, V.: Smart objects as building blocks for the internet of things. IEEE Internet Computing 14, 44–51 (2010)

    Article  Google Scholar 

  2. Kranz, M., Holleis, P., Schmidt, A.: Embedded interaction: Interacting with the internet of things. IEEE Internet Computing 14, 46–53 (2010)

    Article  Google Scholar 

  3. Atzori, L., Iera, A., Morabito, G.: The internet of things: A survey. Computer Networks 54, 2787–2805 (2010)

    Article  MATH  Google Scholar 

  4. Internet of Things (IoT) & Machine-To-Machine (M2M) Communication Market by Technologies & Platforms (RFID, Sensor Nodes, Gateways, Cloud Management, NFC, CEP, SCADA, ZigBee), M2M Connections, IoT Components - Worldwide Market Forecasts (2014 - 2019) (March 2014), marketsandmarkets.com

  5. Sullivan, F.A.: Internet of Things–Technology Penetration and Roadmapping (Technical Insights) (December 31, 2012)

    Google Scholar 

  6. Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, I.: Internet of things: Vision, applications and research challenges. Ad Hoc Networks 10, 1497–1516 (2012)

    Article  Google Scholar 

  7. Weber, R.H.: Internet of Things–New security and privacy challenges. Computer Law & Security Review 26, 23–30 (2010)

    Article  Google Scholar 

  8. Loh, R.C., Kan, W.Y., Kan, S.L.: A User-Controllable Multi-Layer Secure Algorithm for MANET. In: 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 1080–1084 (2012)

    Google Scholar 

  9. Kan, S.L.: Method and system for secured service-oriented nodes discovery and route determination in mobile ad-hoc network (Patent: PCT/SG2009/000032) (2009)

    Google Scholar 

  10. Kan, S.L., Ang, K.W.: Method and System for Securing Wireless Systems and Devices (Patent: 154827) (2007)

    Google Scholar 

  11. Welbourne, E., Battle, L., Cole, G., Gould, K., Rector, K., Raymer, S., et al.: Building the internet of things using RFID: the RFID ecosystem experience. IEEE Internet Computing 13, 48–55 (2009)

    Article  Google Scholar 

  12. Guinard, D., Trifa, V., Karnouskos, S., Spiess, P., Savio, D.: Interacting with the soa-based internet of things: Discovery, query, selection, and on-demand provisioning of web services. IEEE Transactions on Services Computing 3, 223–235 (2010)

    Article  Google Scholar 

  13. Broll, G., Rukzio, E., Paolucci, M., Wagner, M., Schmidt, A., Hussmann, H.: Perci: Pervasive service interaction with the internet of things. IEEE Internet Computing 13, 74–81 (2009)

    Article  Google Scholar 

  14. Zhou, L., Chao, H.-C.: Multimedia traffic security architecture for the internet of things. IEEE Network 25, 35–40 (2011)

    Article  Google Scholar 

  15. Loh, R.C., Kan, S.L.: A Secure Multi-Hop Routing for IoT Communication. Presented at the IEEE World Forum on Internet of Things 2014, Seoul, Korea (2014)

    Google Scholar 

  16. Richardson, T., Stafford-Fraser, Q., Wood, K.R., Hopper, A.: Virtual network computing. IEEE Internet Computing 2, 33–38 (1998)

    Article  Google Scholar 

  17. Hawking Technology: Hi-Gain 15dBi Outdoor Omni-Directional Antenna, http://hawkingtech.com/products/hawking_products/outdoor_wireless_solutions/hao15sip.html

  18. Openmeetings – Open Source Web Conferencing (2006), https://code.google.com/p/openmeetings/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Paul Loh Ruen Chze .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Chze, P.L.R., Leong, K.S., Wee, A.K., Sim, E., May, K.E., Wing, H.S. (2015). Cross-Layer Secured IoT Network and Devices. In: Handa, H., Ishibuchi, H., Ong, YS., Tan, KC. (eds) Proceedings of the 18th Asia Pacific Symposium on Intelligent and Evolutionary Systems - Volume 2. Proceedings in Adaptation, Learning and Optimization, vol 2. Springer, Cham. https://doi.org/10.1007/978-3-319-13356-0_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-13356-0_26

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-13355-3

  • Online ISBN: 978-3-319-13356-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics