Abstract
Based on the popular three-layer IoT architecture, which can naturally be treated as a four-layer architecture by separating the application from the processing layer, this chapter presents an IoT security architecture. The security architecture includes four layers, i.e., perception layer security, network layer security, processing layer security, and application security. Apart from the security requirements in each of the security layers, the proposed IoT security architecture also includes two supporting pillars, one pillar is trust and key management, which is the pre-condition to establish security functionalities of IoT systems, and the other pillar is operational supervision and security evaluation, which is the post-condition of IoT security services. The trust and key management supporting pillar should be made available before authentication and key agreement can be done reliably, and the operational supervision and security evaluation supporting pillar is usually provided by government or industry supervisors when the IoT systems are in operation. This pillar is to make sure that the required security functionalities and security services are provided complying with relevant specifications and standards.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
K.C. Chang, R.N. Zaeem, K.S. Barber, Enhancing and evaluating identity privacy and authentication strength by utilizing the identity ecosystem, UTCID Report #19-03, The University of Texas (2019)
S. Chow, P. Eisen, H. Johnson, P.C. Van Oorschot, White-box cryptography and an AES implementation, in International Workshop on Selected Areas in Cryptography (SAC) (Springer, Berlin, 2002), pp. 250–270
D. Darwish, Improved layered architecture for internet of things. Int. J. Comput. Acad. Res. 4(4), 214–223 (2015)
M.J. Gajjar, Sensor security and location privacy, in Mobile Sensors and Context-Aware Computing, chap. 9 (Elsevier, Amsterdam 2015), pp. 223–265. ISBN: 978-0-12-801660-2
E. Kayacan, M.A. Khanesar, Fundamentals of type-1 fuzzy logic theory, in Fuzzy Neural Networks for Real Time Control Applications (Concepts, Modeling and Algorithms for Fast Learning), chap. 2 (Elsevier, Amsterdam, 2016)
H. Lee, Framework and development of fault detection classification using IoT device and cloud environment. J. Manuf. Syst. 43(2), 257–270 (2017)
G. Veneri, A. Capasso, Industrial data flow and devices, in Hands-on Industrial Internet of Things, chap. 2 (Packt Publishing, Birmingham, 2018)
W. Zhao, Intrusion tolerance techniques, in Encyclopedia of Information Science and Technology, 4th edn. (IGI Global, Hershey, 2018), pp. 4927–4936
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Wu, CK. (2021). IoT Security Architecture. In: Internet of Things Security. Advances in Computer Science and Technology. Springer, Singapore. https://doi.org/10.1007/978-981-16-1372-2_3
Download citation
DOI: https://doi.org/10.1007/978-981-16-1372-2_3
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-1371-5
Online ISBN: 978-981-16-1372-2
eBook Packages: Computer ScienceComputer Science (R0)