Nothing Special   »   [go: up one dir, main page]

Skip to main content

Aspects of Application Security for Internet of Things Systems

  • Conference paper
  • First Online:
Mobile Web and Intelligent Information Systems (MobiWIS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10486))

Included in the following conference series:

  • 1271 Accesses

Abstract

Year by year the solutions associated with the idea of Internet of Things (IoT) gaining in popularity. Internet of Things is a term describing the concepts of network connections between objects that may directly or indirectly collect, process and exchange data via computer networks. It is important to establish new standards of data management as well as create mobile and IoT applications extending the functionalities of IoT systems to enable the users to benefit from the newest technological advances. Addressing these tendencies the paper presents some sensitivities of mobile applications that could compromise the safety of IoT and several methods of dealing with these problems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. McEwen, A., Cassimally, H.: Designing the Internet of Things. Wiley, Chichester (2014)

    Google Scholar 

  2. da Costa, F.: Rethinking the Internet of Things. A Scalable Approach to Connecting Everything. Apress Open, Berkely (2013)

    Google Scholar 

  3. An Introduction to the Internet of Things (IoT). http://www.lopezresearch.com/

  4. Arsénio, A., Serra, H., Francisco, R., Nabais, F., Andrade, J., Serrano, E.: Internet of intelligent things: bringing artificial intelligence into things and communication networks. In: Xhafa, F., Bessis, N. (eds.) Inter-cooperative Collective Intelligence: Techniques and Applications. Studies in Computational Intelligence, vol. 495, pp. 1–37. Springer, Heidelberg (2014). doi:10.1007/978-3-642-35016-0_1

    Chapter  Google Scholar 

  5. Ruggieri, M., Nikookar, H., Vermesan, O., Friess, P.: Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems. River Publishers, Aalborg (2013)

    Google Scholar 

  6. Gartner: Gartner Says 4.9 Billion Connected “Things” Will Be in Use in 2015 (2014). http://www.gartner.com/newsroom/id/2905717

  7. Devito, M.: A security assessment of Z-Wave devices and replay attack vulnerability (2016). https://www.sans.org/reading-room/whitepapers/internet/security-assessment-z-wave-devices-replay-attack-vulnerability-37242

  8. Misra, A., Dubey, A.: Android Security: Attacks and Defenses. Auerbach Publications, Boca Raton (2013)

    Book  Google Scholar 

  9. Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (Im)possibility of obfuscating programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 1–18. Springer, Heidelberg (2001). doi:10.1007/3-540-44647-8_1

    Chapter  Google Scholar 

  10. Wroblewski, G.: General method of program code obfuscation. In: Proceedings of the International Conference on Software Engineering Research and Practice, SERP 2002, USA, pp. 153–159 (2002)

    Google Scholar 

  11. Ceccato, M., Di Penta, M., Nagra, J., Falcarin, P., Ricca, F., Torchiano, M., Tonella, P.: The effectiveness of source code obfuscation - an experimental assessment. In: Proceedings of the 17th IEEE International Conference on Program Comprehension, ICPC, pp. 178–187. IEEE Computer Society (2009)

    Google Scholar 

  12. Madou, M., Anckaert, B., De Bus, B., De Bosschere, K.: On the effectiveness of source code transformations for binary obfuscation. In: Proceedings of the of International Conference on Software Engineering Research and Practice, SERP 2006, pp. 527–533 (2006)

    Google Scholar 

  13. Canetti, R., Tauman Kalai, Y., Varia, M., Wichs, D.: On symmetric encryption and point obfuscation. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 52–71. Springer, Heidelberg (2010). doi:10.1007/978-3-642-11799-2_4

    Chapter  Google Scholar 

  14. Bitansky, N., Canetti, R.: On strong simulation and composable point obfuscation. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 520–537. Springer, Heidelberg (2010). doi:10.1007/978-3-642-14623-7_28

    Chapter  Google Scholar 

  15. Canetti, R., Dakdouk, R.R.: Obfuscating point functions with multibit output. In: Smart, N. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 489–508. Springer, Heidelberg (2008). doi:10.1007/978-3-540-78967-3_28

    Chapter  Google Scholar 

  16. Patra, L., Rao, U.P.: Internet of Things - architecture, applications, security and other major challenges. In: Proceedings of the 3rd International Conference on Computing for Sustainable Global Development, INDIACom, New Delhi, pp. 1201–1206 (2016)

    Google Scholar 

  17. Billure, R., Tayur, V.M., Mahesh, V.: Internet of Things - a study on the security challenges. In: Billure IEEE International Advance Computing Conference, IACC, Banglore, pp. 247–252 (2015)

    Google Scholar 

  18. Shifa, A., Asghar, M.N., Fleury, M.: Multimedia security perspectives in IoT. In: Proceedings of the 6th International Conference on Innovative Computing Technology, INTECH, pp. 550–55 (2016)

    Google Scholar 

  19. Xi, W., Ling, L.: Research on IoT privacy security risks. In: International Conference on Industrial Informatics - Computing Technology, Intelligent Technology, Industrial Information Integration, ICIICII, Wuhan, pp. 259–262 (2016)

    Google Scholar 

  20. Ahamed, J., Rajan, A.V.: Internet of Things (IoT): application systems and security vulnerabilities. In: Proceedings of the 5th International Conference on Electronic Devices, Systems and Applications, ICEDSA, pp. 1–5 (2016)

    Google Scholar 

  21. Banu, R., Ahammed, G.F.A., Fathima, N.: A review on biologically inspired approaches to security for Internet of Things (IoT). In: International Conference on Electrical, Electronics and and Optimization Techniques, ICEEOT, Chennai, pp. 1062–1066 (2016)

    Google Scholar 

  22. Meisel, M., Vasileios, P., Lixia, Z.: A taxonomy of biologically inspired research in computer networking. Elsevier Comput. Netw. J. 54(6), 901–916 (2009)

    Article  MATH  Google Scholar 

  23. Dressler, F., Akan, O.: A survey on bio-inspired networking. Elsevier Comput. Netw. J. 54(6), 881–900 (2010)

    Article  MATH  Google Scholar 

  24. Mohamed, Y.A., Adbullah, A.B.: Biologically inspired Model for Securing Hybrid Mobile Ad hoc Networks. IEEE (2008)

    Google Scholar 

  25. Rathore, H., Jha, S.: Bio-Inspired Machine Learning Based Wireless Sensor Network Security. IEEE (2013)

    Google Scholar 

  26. Hodo, E., et al.: Threat analysis of IoT networks using artificial neural network intrusion detection system. In: International Symposium on Networks, Computers and Communications, ISNCC, pp. 1–6 (2016)

    Google Scholar 

  27. Michalska, A., Poniszewska-Marańda, A.: Security risks and their prevention capabilities in mobile application development. Inf. Syst. Manag. 4(2), 123–134 (2015). WULS Press

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aneta Poniszewska-Maranda .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Poniszewska-Maranda, A., Wieczorek, B. (2017). Aspects of Application Security for Internet of Things Systems. In: Younas, M., Awan, I., Holubova, I. (eds) Mobile Web and Intelligent Information Systems. MobiWIS 2017. Lecture Notes in Computer Science(), vol 10486. Springer, Cham. https://doi.org/10.1007/978-3-319-65515-4_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-65515-4_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-65514-7

  • Online ISBN: 978-3-319-65515-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics