Abstract
The Internet of Things (IoT)/Machine to Machine (M2M) service must provide security mechanisms to avoid illegal usage of the service. However, in some situation the gateways involved in the IoT/M2M systems are resource-constrained. Hence, the commonly used Transport Layer Security (TLS) protocol cannot be readily applicable to ensure the security of the IoT/M2M systems. Our research focuses on providing IoT/M2M system security under the limitation of constrained gateways. We design a security mechanism on top of the security framework defined in the oneM2M standard to address this problem. Furthermore, we implement this mechanism on the OM2M platform and evaluate it in terms of cost and performance.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of Things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 17(4), 2347–2376 (2015). https://doi.org/10.1109/COMST.2015.2444095
Network Working Group: The Transport Layer Security (TLS) Protocol, Version 1.2. (2008)
Network Working Group: Datagram Transport Layer Security, Version 1.2. (2012)
Hummen, R., Shafagh, H., Raza, S., Voig, T., Wehrle, K.: Delegation-based authentication and authorization for the IP-based Internet of Things. In: 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), pp. 284–292 (2014)
Apostolopoulos, G., Peris, V., Saha, D.: Transport layer security: how much does it really cost? In: Proceedings of the Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 1999, vol. 2, pp. 717–725. IEEE (1999)
Kuo, F.C., Tschofenig, H., Meyer, F., Fu, X.: Comparison studies between pre-shared key and public key exchange mechanisms for transport layer security (TLS). Institute for Informatics, University of Goettingen, Technical Report IFI-TB-2006-01 (2006)
oneM2M, TS 0001 v2.10.0: Functional Architecture
oneM2M, TS 0003 v2.4.1: Security Solutions
Hsu, Y.-H., Lin, F.J.: Preventing misuse of duplicate certificates in IoT/M2M systems. In: The 7th International Workshop on Internet on Things: Privacy, Security and Trust (IoTPST), 31 July–3 August 2017, Vancouver, Canada (2017)
VisualVM. https://visualvm.github.io/
Acknowledgments
The research reported in this paper is funded by QNAP Systems. We would like to thank Amol Narkhede and Mohan S. P. of QNAP for their guidance and feedback during the process of research.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Chen, KL., Lin, F.J. (2017). Ensuring IoT/M2M System Security Under the Limitation of Constrained Gateways. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, KK. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2017. Lecture Notes in Computer Science(), vol 10658. Springer, Cham. https://doi.org/10.1007/978-3-319-72395-2_28
Download citation
DOI: https://doi.org/10.1007/978-3-319-72395-2_28
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-72394-5
Online ISBN: 978-3-319-72395-2
eBook Packages: Computer ScienceComputer Science (R0)