{"title":"On the design of security mechanisms for the Internet of Things","authors":"S. Pal, M. Hitchens, V. Varadharajan","doi":"10.1109/ICSENST.2017.8304476","DOIUrl":null,"url":null,"abstract":"With the rapid growth of the Internet of Things (IoT), there is a need for secure and scalable architectures for the IoT. This paper is a step towards this goal. We propose a set of security requirements for IoT systems and describe a novel security mechanism designed to those requirements. We divide the security threats and attacks on the IoT into five distinct categories, i.e. communications, device/services, users, mobility and integration of resources and employ them in developing the proposed requirements and mechanism. We argue that, by adopting such an approach in an IoT system, security can be achieved in a practical and comprehensive manner.","PeriodicalId":289209,"journal":{"name":"2017 Eleventh International Conference on Sensing Technology (ICST)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Eleventh International Conference on Sensing Technology (ICST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSENST.2017.8304476","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 14
Abstract
With the rapid growth of the Internet of Things (IoT), there is a need for secure and scalable architectures for the IoT. This paper is a step towards this goal. We propose a set of security requirements for IoT systems and describe a novel security mechanism designed to those requirements. We divide the security threats and attacks on the IoT into five distinct categories, i.e. communications, device/services, users, mobility and integration of resources and employ them in developing the proposed requirements and mechanism. We argue that, by adopting such an approach in an IoT system, security can be achieved in a practical and comprehensive manner.