Shancang Li
The Internet of Things: a security point of view
Li, Shancang; Tryfonas, Theo; Li, Honglei
Authors
Theo Tryfonas
Honglei Li
Abstract
© 2016, © Emerald Group Publishing Limited. Purpose – The purpose of this paper is to provide an in-depth overview of the security requirements and challenges for Internet of Things (IoT) and discuss security solutions for various enabling technologies and implications to various applications. Design/methodology/approach – Security requirements and solutions are analysed based on a four-layer framework of IoT on sensing layer, network layer, service layer, and application layer. The cross-layer threats are analysed followed by the security discussion for the enabling technologies including identification and tracking technologies, WSN and RFID, communication, networks, and service management. Findings – IoT calls for new security infrastructure based on the new technical standards. As a consequence, new security design for IoT shall pay attention to these new standards. Security at both the physical devices and service-applications is critical to the operation of IoT, which is indispensable for the success of IoT. Open problems remain in a number of areas, such as security and privacy protection, network protocols, standardization, identity management, trusted architecture, etc. Practical implications – The implications to various applications including supervisory control and data acquisition, enterprise systems, social IoT are discussed. The paper will serve as a starting point for future IoT security design and management. The security strategies for IoT should be carefully designed by managing the tradeoffs among security, privacy, and utility to provide security in multi-layer architecture of IoT. Originality/value – The paper synthesizes the current security requirements for IoT and provides a clear framework of security infrastructure based on four layers. Accordingly, the security requirements and potential threats in the four-layer architecture are provided in terms of general devices security, communication security, network security, and application security.
Journal Article Type | Article |
---|---|
Acceptance Date | Oct 15, 2015 |
Publication Date | Apr 4, 2016 |
Deposit Date | Sep 19, 2016 |
Publicly Available Date | Sep 19, 2016 |
Journal | Internet Research |
Print ISSN | 1066-2243 |
Publisher | Emerald |
Peer Reviewed | Peer Reviewed |
Volume | 26 |
Issue | 2 |
Pages | 337-359 |
DOI | https://doi.org/10.1108/IntR-07-2014-0173 |
Keywords | Internet of things, security requirements, multi-layer security architecture |
Public URL | https://uwe-repository.worktribe.com/output/920758 |
Publisher URL | http://dx.doi.org/10.1108/IntR-07-2014-0173 |
Additional Information | Additional Information : The final publication is available at http://dx.doi.org/10.1108/IntR-07-2014-0173. |
Contract Date | Sep 19, 2016 |
Files
IR-1073.pdf
(714 Kb)
PDF
Downloadable Citations
About UWE Bristol Research Repository
Administrator e-mail: repository@uwe.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search