Skip to main content

Ensuring IoT/M2M System Security Under the Limitation of Constrained Gateways

  • Conference paper
  • First Online:
Book cover Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10658))

  • 2932 Accesses

Abstract

The Internet of Things (IoT)/Machine to Machine (M2M) service must provide security mechanisms to avoid illegal usage of the service. However, in some situation the gateways involved in the IoT/M2M systems are resource-constrained. Hence, the commonly used Transport Layer Security (TLS) protocol cannot be readily applicable to ensure the security of the IoT/M2M systems. Our research focuses on providing IoT/M2M system security under the limitation of constrained gateways. We design a security mechanism on top of the security framework defined in the oneM2M standard to address this problem. Furthermore, we implement this mechanism on the OM2M platform and evaluate it in terms of cost and performance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of Things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 17(4), 2347–2376 (2015). https://doi.org/10.1109/COMST.2015.2444095

    Article  Google Scholar 

  2. Network Working Group: The Transport Layer Security (TLS) Protocol, Version 1.2. (2008)

    Google Scholar 

  3. Network Working Group: Datagram Transport Layer Security, Version 1.2. (2012)

    Google Scholar 

  4. Hummen, R., Shafagh, H., Raza, S., Voig, T., Wehrle, K.: Delegation-based authentication and authorization for the IP-based Internet of Things. In: 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), pp. 284–292 (2014)

    Google Scholar 

  5. Apostolopoulos, G., Peris, V., Saha, D.: Transport layer security: how much does it really cost? In: Proceedings of the Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 1999, vol. 2, pp. 717–725. IEEE (1999)

    Google Scholar 

  6. Kuo, F.C., Tschofenig, H., Meyer, F., Fu, X.: Comparison studies between pre-shared key and public key exchange mechanisms for transport layer security (TLS). Institute for Informatics, University of Goettingen, Technical Report IFI-TB-2006-01 (2006)

    Google Scholar 

  7. oneM2M. http://www.onem2m.org/about-onem2m/why-onem2m

  8. oneM2M, TS 0001 v2.10.0: Functional Architecture

    Google Scholar 

  9. oneM2M, TS 0003 v2.4.1: Security Solutions

    Google Scholar 

  10. Hsu, Y.-H., Lin, F.J.: Preventing misuse of duplicate certificates in IoT/M2M systems. In: The 7th International Workshop on Internet on Things: Privacy, Security and Trust (IoTPST), 31 July–3 August 2017, Vancouver, Canada (2017)

    Google Scholar 

  11. OM2M. https://wiki.eclipse.org/OM2M/one

  12. VisualVM. https://visualvm.github.io/

Download references

Acknowledgments

The research reported in this paper is funded by QNAP Systems. We would like to thank Amol Narkhede and Mohan S. P. of QNAP for their guidance and feedback during the process of research.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fuchun Joseph Lin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chen, KL., Lin, F.J. (2017). Ensuring IoT/M2M System Security Under the Limitation of Constrained Gateways. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, KK. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2017. Lecture Notes in Computer Science(), vol 10658. Springer, Cham. https://doi.org/10.1007/978-3-319-72395-2_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-72395-2_28

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-72394-5

  • Online ISBN: 978-3-319-72395-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics