Abstract
This paper proposes IoT security framework including protection of key value in a device. Also, we suggest seamless key protection in spite of heterogeneous IoT framework by making ‘initial secret value’ on IoT device information and secret value made by result value through authentication mechanism through FIDO mechanisms.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
FIDO Authentication (2015). https://fidoalliance.org/specifications/download/
Security 2.0. https://allseenalliance.org/developers/learn/core/security2_0/hld. Allseen alliance, January 2015
OIC, OIC_Security_Specification_Project_B_v0.9.9. OIC alliance (2015)
oneM2M, TS-0003-Security_Solutions-V1_0_1. oneM2M (2015)
DTLS, Datagram Transport Layer Security Version 1.2. RFC 6347 (2012)
TLS, The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (2008)
ISO/IEC 15946, Information technology– Security techniques– Cryptographic techniques based on elliptic curves, November 2011
Internet of Things: Privacy & Security in a Connected World, FTC, January 2015
Zhang, W., Qu, B.: Security Architecture of the IoT Oriented to Perceptual Layer. IJ3C 2(2) (2013)
Opinion 8/2014 on the on Recent Developments on the IoT. EU Data Protection Working Party, September 2014
Jha, A., Sunil, M.C.: Whitepaper: Security Considerations for Internet of Things. L&T Technology Services (2015)
Zhao, K., Ge, L.: A survey on the internet of things security, In: 2013 Ninth International Conference on Computational Intelligence and Security. IEEE (2013)
Zhang, B., Zou, Z., Liu, M.: Evaluation on security system of internet of things based on fuzzy-AHP method. In: ICEE, May 2011
Babar, S., Stango, A., Prasad, N., Sen, J., Prasad, R.: Proposed embedded security framework for internet of things (IoT). In: 2011 2nd International Conference on Wireless VITAE (2011)
Roman, R.: Securing the Internet of Things. IEEE Computer 44(9), 51–58 (2011)
Heer, T.: Security Challenges in the IP-based Internet of Things. Journal on Wireless Personal Communications 61(3), 527–542 (2011)
Whitehouse, O.: Security of Things: An Implementers’ Guide to Cyber-security for Internet of Things Devices and Beyond, NCC Group (2014)
Babar, S., et al.: Proposed security model and threat taxonomy for the IoT. In: CNSA 2010, pp. 420–429 (2010)
Ukil, A.: Embedded security for internet of things. In: NCETACS 2011, pp. 1–6 (2011)
Ora, L.: Safety standards in the ARM ecosystem. ARM Whitepaper, January 2015
Kempf, J., et al.: Thoughts on reliability in the internet of things. In: Interconnecting smart objects with the Internet workshop, vol. 1 (2011)
Linpner, S.: The trustworthy computing security development lifecycle. In: ACSAC 2004, pp. 2–13 (2004)
Security Considerations in the System Development Life Cycle (SP800-64 Revision2). NIST (2008)
Bormann, C., et al.: Terminology for Constrained-Node Networks (RFC7228). IETF, May 2014
Internet of Things Research Study 2014 Report, Hewlett Packard (2014)
Pescatore, J.: Securing the Internet of Things Survey. SANS Institute, January 2014
Ministry of Science, ICT and Future Planning, South Korea. http://www.msip.go.kr
10 Specialized Action Plans for IoT Development (2013-2015), Ministry of Industry and Information Technology, China
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer Science+Business Media Singapore
About this paper
Cite this paper
Yoon, M., Baek, J. (2015). A Study on Framework for Developing Secure IoT Service. In: Park, DS., Chao, HC., Jeong, YS., Park, J. (eds) Advances in Computer Science and Ubiquitous Computing. Lecture Notes in Electrical Engineering, vol 373. Springer, Singapore. https://doi.org/10.1007/978-981-10-0281-6_42
Download citation
DOI: https://doi.org/10.1007/978-981-10-0281-6_42
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0280-9
Online ISBN: 978-981-10-0281-6
eBook Packages: Computer ScienceComputer Science (R0)