Securing the internet of things infrastructure – Standards and techniques
Abstract
The Internet of Things (IoT) infrastructure is a conglomerate of electronic devices interconnected through the Internet, with the purpose of providing prompt and effective service to end-users. Applications running on an IoT infrastructure generally handle sensitive information such as a patient’s healthcare record, the position of a logistic vehicle, or the temperature readings obtained through wireless sensor nodes deployed in a bushland. The protection of such information from unlawful disclosure, tampering or modification, as well as the unscathed presence of IoT devices, in adversarial environments, is of prime concern. In this paper, a descriptive analysis of the security of standards and technologies for protecting the IoT communication channel from adversarial threats is provided. In addition, two paradigms for securing the IoT infrastructure, namely, common key based and paired key based, are proposed.
RAS ID
18235
Document Type
Conference Proceeding
Date of Publication
1-1-2014
Faculty
Faculty of Health, Engineering and Science
School
School of Computer and Security Science / Security Research Institute
Copyright
free_to_read
Publisher
Edith Cowan University
Recommended Citation
Baig, Z. A. (2014). Securing the internet of things infrastructure – Standards and techniques. DOI: https://doi.org/10.4225/75/57b6651c343d6
Comments
Originally published in the Proceedings of the 12th Australian Information Security Management Conference. Held on the 1-3 December, 2014 at Edith Cowan University, Joondalup Campus, Perth, Western Australia. Available here