Skip to main content

Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT)

  • Conference paper
Recent Trends in Network Security and Applications (CNSA 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 89))

Included in the following conference series:

Abstract

IoT is an intelligent collaboration of tiny sensors and devices giving new challenges to security and privacy in end to end communication of things. Protection of data and privacy of things is one of the key challenges in the IoT. Lack of security measures will result in decreased adoption among users and therefore is one of the driving factors in the success of the IoT. This paper gives an overview, analysis and taxonomy of security and privacy challenges in IoT. Finally, Security Model for IoT has been proposed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Silverajan, B., Harju, J.: Developing network software and communications protocols towards the internet of things. In: Proceedings of the Fourth International ICST Conference on Communication System Software and MiddlewaRE, COMSWARE 2009, Dublin, Ireland, June 16-19, pp. 1–8. ACM, New York (2009)

    Chapter  Google Scholar 

  2. Adjie-Winoto, W., Schwartz, E., Balakrishnan, H., Lilley, J.: The design and implementation of an intentional naming system. In: Proceedings of the Seventeenth ACM Symposium on Operating Systems Principles, SOSP 1999, Charleston, South Carolina, US, December 12-15, pp. 186–201. ACM, New York (1999)

    Chapter  Google Scholar 

  3. Beerliova, Z., Eberhard, F., Erlebach, T., Hall, A., Hoffmann, M., Mihalák, M., Ram, L.S.: Network Discovery and Verification. IEEE Journal on Selected Areas in Communications 24(12), 2168–2181 (2006)

    Article  Google Scholar 

  4. Hu, Y.-C., Wang, H.J.: Location Privacy in Wireless Networks. In: Proceedings of the ACM SIGCOMM Asia Workshop (2005)

    Google Scholar 

  5. Kocher, P., Lee, R., McGraw, G., Raghunathan, A.: Security as a new dimension in embedded system design. In: Proceedings of the 41st Annual Design Automation Conference, DAC 2004, San Diego, CA, USA, June 7-11, pp. 753–760. ACM, New York (2004)

    Google Scholar 

  6. Welch, D., Lathrop, S.: Wireless security threat taxonomy. In: Information Assurance Workshop, IEEE Systems, Man and Cybernetics Society, June 18-20, pp. 76–83 (2003)

    Google Scholar 

  7. Public-Key Infrastructure (X.509), http://tools.ietf.org/wg/pkix/

  8. Kohnfelder, L.M.: Towards a Practical Public Key System, Thesis (1978), http://dspace.mit.edu/bitstream/handle/1721.1/15993/07113748.pdf

  9. Neuman, B.C., Ts’o, T.: Kerberos: an authentication service for computer networks. IEEE Communications Magazine 32(9), 33–38 (1994)

    Article  Google Scholar 

  10. Introduction to Windows Live ID, download, http://msdn.microsoft.com/enus/library/bb288408.aspx/

  11. OpenID, http://openid.net/specs/openid-authentication-1_1.html

  12. Introduction to the Liberty Alliance Identity Architecture (2003), http://xml.coverpages.org/LibertyAllianceArchitecture200303.pdf

  13. Goodner, M.: Understanding WS-Federation (2007), http://msdn.microsoft.com/en-us/library/bb498017.aspx

  14. Shim, S.S.Y., Bhalla, P.: Federated identity management. IEEE Computer 38(12), 120–122 (2005)

    Google Scholar 

  15. Chappell, D.: Introducing Windows CardSpace, http://msdn.microsoft.com/en-us/library/aa480189.aspx

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Babar, S., Mahalle, P., Stango, A., Prasad, N., Prasad, R. (2010). Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT). In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14478-3_42

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14477-6

  • Online ISBN: 978-3-642-14478-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics