skip to main content
10.1145/2896387.2906198acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccConference Proceedingsconference-collections
research-article

Securing Sensor to Cloud Ecosystem using Internet of Things (IoT) Security Framework

Authors Info & Claims
Published:22 March 2016Publication History

ABSTRACT

The Internet of things (IoT) refers to every object, which is connected over a network with the ability to transfer data. Users perceive this interaction and connection as useful in their daily life. However any improperly designed and configured technology will exposed to security threats. Therefore an ecosystem for IoT should be designed with security embedded in each layer of its ecosystem. This paper will discussed the security threats to IoT and then proposed an IoT Security Framework to mitigate it. Then IoT Security Framework will be used to develop a Secure IoT Sensor to Cloud Ecosystem.

References

  1. Anderson, C. R. 2014. The internet of Things: The possibilities are endless, but how will we get there?. IDC APeJ Internet of Things Web Conference on 19 June 2014.Google ScholarGoogle Scholar
  2. Prentice, S. 2014. "The Five SMART Technologies to Watch", GartnerGoogle ScholarGoogle Scholar
  3. Higginbotham, S. 2011. Ericsson CEO Predicts 50 Billion Internet Connected Devices by 2020. Ericsson. DOI at: http://gigaom.com/2010/04/14/ericsson-sees-the-internet-of-things-by-2020/Google ScholarGoogle Scholar
  4. Davies, J. 2014. "Internet of Things crisis? Privacy issues could be barrier to smart-device take-up, says Ipsos Mori report".Google ScholarGoogle Scholar
  5. Tarkoma, S., Katasonov, A.: Internet of Things Strategic Research Agenda. Finnish Strategic Centre for Science, Technology and Innovation. 2011.Google ScholarGoogle Scholar
  6. Farhana T. and H. Islam. 2009. Wearable Wireless Body Area Networks. Proceedings of the Information Management and Engineering, (ICIME '09). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Hewlett Packard (HP), Internet of Things Research Study. 2015. DOI: http://www8.hp.com/h20195/V2/GetPDF.aspx/4AA5-4759ENW.pdfGoogle ScholarGoogle Scholar
  8. Rahman A.F.A and Mohamad M. Z. 2015. Developing the Security Zone for Wireless Body Area Network (WBAN) Implementation Using Practical Security Assessment (PSA). Journal of Advance Computer and Network (JACN).Google ScholarGoogle ScholarCross RefCross Ref
  9. Open Web Application Security Project (OWASP) IoT Top Ten Vulnerabilities. 2014. DOI https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdfGoogle ScholarGoogle Scholar
  10. Kumar J. S. and Patel D. R. 2014. A Survey on Internet of Things: Security and Privacy Issues. International Journal of Computer Applications. Vol. 90. No. 11.Google ScholarGoogle Scholar
  11. Dong H.K. Ji Y. C., Sungjun K. and Jongin L. 2015. A study of Developing Security Requirements for Internet of Things. Advances Science and Technology Letters. Vol 87.Google ScholarGoogle Scholar
  12. Jung T. K. 2013. Analyses of Integrated Security Framework with Embedded RFID System for Wireless Network Architecture. Journal of Convergence Information Technology Vol 8. No. 14 2013.Google ScholarGoogle Scholar
  1. Securing Sensor to Cloud Ecosystem using Internet of Things (IoT) Security Framework

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICC '16: Proceedings of the International Conference on Internet of things and Cloud Computing
      March 2016
      535 pages
      ISBN:9781450340632
      DOI:10.1145/2896387

      Copyright © 2016 ACM

      © 2016 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 22 March 2016

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate213of590submissions,36%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader