Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2896387.2906198acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccConference Proceedingsconference-collections
research-article

Securing Sensor to Cloud Ecosystem using Internet of Things (IoT) Security Framework

Published: 22 March 2016 Publication History

Abstract

The Internet of things (IoT) refers to every object, which is connected over a network with the ability to transfer data. Users perceive this interaction and connection as useful in their daily life. However any improperly designed and configured technology will exposed to security threats. Therefore an ecosystem for IoT should be designed with security embedded in each layer of its ecosystem. This paper will discussed the security threats to IoT and then proposed an IoT Security Framework to mitigate it. Then IoT Security Framework will be used to develop a Secure IoT Sensor to Cloud Ecosystem.

References

[1]
Anderson, C. R. 2014. The internet of Things: The possibilities are endless, but how will we get there?. IDC APeJ Internet of Things Web Conference on 19 June 2014.
[2]
Prentice, S. 2014. "The Five SMART Technologies to Watch", Gartner
[3]
Higginbotham, S. 2011. Ericsson CEO Predicts 50 Billion Internet Connected Devices by 2020. Ericsson. DOI at: http://gigaom.com/2010/04/14/ericsson-sees-the-internet-of-things-by-2020/
[4]
Davies, J. 2014. "Internet of Things crisis? Privacy issues could be barrier to smart-device take-up, says Ipsos Mori report".
[5]
Tarkoma, S., Katasonov, A.: Internet of Things Strategic Research Agenda. Finnish Strategic Centre for Science, Technology and Innovation. 2011.
[6]
Farhana T. and H. Islam. 2009. Wearable Wireless Body Area Networks. Proceedings of the Information Management and Engineering, (ICIME '09).
[7]
Hewlett Packard (HP), Internet of Things Research Study. 2015.
[8]
Rahman A.F.A and Mohamad M. Z. 2015. Developing the Security Zone for Wireless Body Area Network (WBAN) Implementation Using Practical Security Assessment (PSA). Journal of Advance Computer and Network (JACN).
[9]
Open Web Application Security Project (OWASP) IoT Top Ten Vulnerabilities. 2014. DOI https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf
[10]
Kumar J. S. and Patel D. R. 2014. A Survey on Internet of Things: Security and Privacy Issues. International Journal of Computer Applications. Vol. 90. No. 11.
[11]
Dong H.K. Ji Y. C., Sungjun K. and Jongin L. 2015. A study of Developing Security Requirements for Internet of Things. Advances Science and Technology Letters. Vol 87.
[12]
Jung T. K. 2013. Analyses of Integrated Security Framework with Embedded RFID System for Wireless Network Architecture. Journal of Convergence Information Technology Vol 8. No. 14 2013.

Cited By

View all
  • (2024)Publish Subscribe System Security Requirement: A Case Study for V2V CommunicationIEEE Open Journal of the Computer Society10.1109/OJCS.2024.34429215(389-405)Online publication date: 2024
  • (2024)A secure framework for the Internet of Things anomalies using machine learningDiscover Internet of Things10.1007/s43926-024-00088-z4:1Online publication date: 20-Dec-2024
  • (2023)Secure authentication protocol for IoT applications based on blockchain technologyi-manager's Journal on Computer Science10.26634/jcom.11.1.1938011:1(12)Online publication date: 2023
  • Show More Cited By
  1. Securing Sensor to Cloud Ecosystem using Internet of Things (IoT) Security Framework

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICC '16: Proceedings of the International Conference on Internet of things and Cloud Computing
    March 2016
    535 pages
    ISBN:9781450340632
    DOI:10.1145/2896387
    © 2016 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 22 March 2016

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Framework
    2. Information Security
    3. Internet of Things (IoT)
    4. IoT Ecosystem
    5. Security Threats

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICC '16

    Acceptance Rates

    Overall Acceptance Rate 213 of 590 submissions, 36%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)25
    • Downloads (Last 6 weeks)4
    Reflects downloads up to 27 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Publish Subscribe System Security Requirement: A Case Study for V2V CommunicationIEEE Open Journal of the Computer Society10.1109/OJCS.2024.34429215(389-405)Online publication date: 2024
    • (2024)A secure framework for the Internet of Things anomalies using machine learningDiscover Internet of Things10.1007/s43926-024-00088-z4:1Online publication date: 20-Dec-2024
    • (2023)Secure authentication protocol for IoT applications based on blockchain technologyi-manager's Journal on Computer Science10.26634/jcom.11.1.1938011:1(12)Online publication date: 2023
    • (2023)Smart Home IoT Cybersecurity Survey: A Systematic Mapping2023 Conference on Information Communications Technology and Society (ICTAS)10.1109/ICTAS56421.2023.10082751(1-6)Online publication date: Mar-2023
    • (2023)Smart contract-based security architecture for collaborative services in municipal smart citiesJournal of Systems Architecture10.1016/j.sysarc.2022.102802135(102802)Online publication date: Feb-2023
    • (2023)Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automationInternational Journal of Information Security10.1007/s10207-023-00669-z22:4(833-867)Online publication date: 17-Feb-2023
    • (2023)Detailed Review of Challenges in Cloud ComputingProceedings of 3rd International Conference on Mathematical Modeling and Computational Science10.1007/978-981-99-3611-3_20(251-259)Online publication date: 29-Aug-2023
    • (2023)Sensor Cloud Data Privacy Protection Model Based on Collaborative Deep LearningUbiquitous Security10.1007/978-981-99-0272-9_29(423-435)Online publication date: 16-Feb-2023
    • (2023)Comparison of Cybersecurity Methodologies for the Implementing of a Secure IoT ArchitectureCybersecurity in the Age of Smart Societies10.1007/978-3-031-20160-8_2(9-29)Online publication date: 3-Jan-2023
    • (2022)Security and Privacy Threats in IoT-Enabled Smart CitiesIoT for Sustainable Smart Cities and Society10.1007/978-3-030-89554-9_13(277-300)Online publication date: 11-May-2022
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media