A Novel Secure Architecture for the Internet of Things

被引:5
作者
Qian, Jiewei [1 ]
Xu, He [1 ,2 ]
Li, Peng [1 ,2 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Software, Sch Comp Sci & Technol, Nanjing 210003, Jiangsu, Peoples R China
[2] Jiangsu High Technol Res Key Lab Wireless Sensor, Nanjing 210003, Jiangsu, Peoples R China
来源
2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS) | 2016年
关键词
IOT;
D O I
10.1109/INCoS.2016.36
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The "Internet of Things"(IoT) opens opportunities for devices and softwares to share information on an unprecedented scale. However, such a large interconnected network poses new challenges to system developers and users. In this article, we propose a layered architecture of IoT system. Using this model, we try to identify and assess each layer's challenges. We also discuss several existing technologies that can be used make this architecture secure.
引用
收藏
页码:398 / 401
页数:4
相关论文
共 25 条
  • [11] Internet of Things (IoT): A vision, architectural elements, and future directions
    Gubbi, Jayavardhana
    Buyya, Rajkumar
    Marusic, Slaven
    Palaniswami, Marimuthu
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (07): : 1645 - 1660
  • [12] A secure delegation scheme of large polynomial computation in multi-party cloud
    Institute of Information Engineering, Chinese Academy of Science, Beijing, China
    [J]. Int. J. Grid Util. Comput., 1 (1-7): : 1 - 7
  • [13] A time stamp-based elliptic curve cryptosystem for wireless ad-hoc sensor networks
    Indra, Gaurav
    Taneja, Renu
    [J]. INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2014, 4 (01) : 39 - 54
  • [14] Matharu Gurpreet Singh, 2014, 2014 International Conference on Emerging Technologies (ICET), P54, DOI 10.1109/ICET.2014.7021016
  • [15] The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching
    Nappa, Antonio
    Johnson, Richard
    Bilge, Leyla
    Caballero, Juan
    Dumitras, Tudor
    [J]. 2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, : 692 - 708
  • [16] Comparing passwords, tokens, and biometrics for user atithentication
    O'Gorman, L
    [J]. PROCEEDINGS OF THE IEEE, 2003, 91 (12) : 2021 - 2040
  • [17] Future internet: trends and challenges
    Pereira, Rubem
    Pereira, Ella G.
    [J]. INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2015, 5 (03) : 159 - 167
  • [18] A privacy-friendly architecture for future cloud computing
    Petrlic, Ronald
    Sekula, Stephan
    Sorge, Christoph
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (04) : 265 - 277
  • [19] Securing the Internet of Things
    Roman, Rodrigo
    Najera, Pablo
    Lopez, Javier
    [J]. COMPUTER, 2011, 44 (09) : 51 - 58
  • [20] Shahzad M, 2012, PROC INT CONF SOFTW, P771, DOI 10.1109/ICSE.2012.6227141