Skip to main content

IoT Security Architecture

  • Chapter
  • First Online:
Internet of Things Security

Part of the book series: Advances in Computer Science and Technology ((ACST))

Abstract

Based on the popular three-layer IoT architecture, which can naturally be treated as a four-layer architecture by separating the application from the processing layer, this chapter presents an IoT security architecture. The security architecture includes four layers, i.e., perception layer security, network layer security, processing layer security, and application security. Apart from the security requirements in each of the security layers, the proposed IoT security architecture also includes two supporting pillars, one pillar is trust and key management, which is the pre-condition to establish security functionalities of IoT systems, and the other pillar is operational supervision and security evaluation, which is the post-condition of IoT security services. The trust and key management supporting pillar should be made available before authentication and key agreement can be done reliably, and the operational supervision and security evaluation supporting pillar is usually provided by government or industry supervisors when the IoT systems are in operation. This pillar is to make sure that the required security functionalities and security services are provided complying with relevant specifications and standards.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. K.C. Chang, R.N. Zaeem, K.S. Barber, Enhancing and evaluating identity privacy and authentication strength by utilizing the identity ecosystem, UTCID Report #19-03, The University of Texas (2019)

    Google Scholar 

  2. S. Chow, P. Eisen, H. Johnson, P.C. Van Oorschot, White-box cryptography and an AES implementation, in International Workshop on Selected Areas in Cryptography (SAC) (Springer, Berlin, 2002), pp. 250–270

    MATH  Google Scholar 

  3. D. Darwish, Improved layered architecture for internet of things. Int. J. Comput. Acad. Res. 4(4), 214–223 (2015)

    Google Scholar 

  4. M.J. Gajjar, Sensor security and location privacy, in Mobile Sensors and Context-Aware Computing, chap. 9 (Elsevier, Amsterdam 2015), pp. 223–265. ISBN: 978-0-12-801660-2

    Google Scholar 

  5. E. Kayacan, M.A. Khanesar, Fundamentals of type-1 fuzzy logic theory, in Fuzzy Neural Networks for Real Time Control Applications (Concepts, Modeling and Algorithms for Fast Learning), chap. 2 (Elsevier, Amsterdam, 2016)

    Google Scholar 

  6. H. Lee, Framework and development of fault detection classification using IoT device and cloud environment. J. Manuf. Syst. 43(2), 257–270 (2017)

    Article  Google Scholar 

  7. G. Veneri, A. Capasso, Industrial data flow and devices, in Hands-on Industrial Internet of Things, chap. 2 (Packt Publishing, Birmingham, 2018)

    Google Scholar 

  8. W. Zhao, Intrusion tolerance techniques, in Encyclopedia of Information Science and Technology, 4th edn. (IGI Global, Hershey, 2018), pp. 4927–4936

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Wu, CK. (2021). IoT Security Architecture. In: Internet of Things Security. Advances in Computer Science and Technology. Springer, Singapore. https://doi.org/10.1007/978-981-16-1372-2_3

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-1372-2_3

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-1371-5

  • Online ISBN: 978-981-16-1372-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics