Skip to main content

A Study on Framework for Developing Secure IoT Service

  • Conference paper
  • First Online:
Advances in Computer Science and Ubiquitous Computing

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 373))

Abstract

This paper proposes IoT security framework including protection of key value in a device. Also, we suggest seamless key protection in spite of heterogeneous IoT framework by making ‘initial secret value’ on IoT device information and secret value made by result value through authentication mechanism through FIDO mechanisms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. FIDO Authentication (2015). https://fidoalliance.org/specifications/download/

  2. Security 2.0. https://allseenalliance.org/developers/learn/core/security2_0/hld. Allseen alliance, January 2015

  3. OIC, OIC_Security_Specification_Project_B_v0.9.9. OIC alliance (2015)

    Google Scholar 

  4. oneM2M, TS-0003-Security_Solutions-V1_0_1. oneM2M (2015)

    Google Scholar 

  5. DTLS, Datagram Transport Layer Security Version 1.2. RFC 6347 (2012)

    Google Scholar 

  6. TLS, The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (2008)

    Google Scholar 

  7. ISO/IEC 15946, Information technology– Security techniques– Cryptographic techniques based on elliptic curves, November 2011

    Google Scholar 

  8. Internet of Things: Privacy & Security in a Connected World, FTC, January 2015

    Google Scholar 

  9. Zhang, W., Qu, B.: Security Architecture of the IoT Oriented to Perceptual Layer. IJ3C 2(2) (2013)

    Google Scholar 

  10. Opinion 8/2014 on the on Recent Developments on the IoT. EU Data Protection Working Party, September 2014

    Google Scholar 

  11. Jha, A., Sunil, M.C.: Whitepaper: Security Considerations for Internet of Things. L&T Technology Services (2015)

    Google Scholar 

  12. Zhao, K., Ge, L.: A survey on the internet of things security, In: 2013 Ninth International Conference on Computational Intelligence and Security. IEEE (2013)

    Google Scholar 

  13. Zhang, B., Zou, Z., Liu, M.: Evaluation on security system of internet of things based on fuzzy-AHP method. In: ICEE, May 2011

    Google Scholar 

  14. Babar, S., Stango, A., Prasad, N., Sen, J., Prasad, R.: Proposed embedded security framework for internet of things (IoT). In: 2011 2nd International Conference on Wireless VITAE (2011)

    Google Scholar 

  15. Roman, R.: Securing the Internet of Things. IEEE Computer 44(9), 51–58 (2011)

    Article  Google Scholar 

  16. Heer, T.: Security Challenges in the IP-based Internet of Things. Journal on Wireless Personal Communications 61(3), 527–542 (2011)

    Article  Google Scholar 

  17. Whitehouse, O.: Security of Things: An Implementers’ Guide to Cyber-security for Internet of Things Devices and Beyond, NCC Group (2014)

    Google Scholar 

  18. Babar, S., et al.: Proposed security model and threat taxonomy for the IoT. In: CNSA 2010, pp. 420–429 (2010)

    Google Scholar 

  19. Ukil, A.: Embedded security for internet of things. In: NCETACS 2011, pp. 1–6 (2011)

    Google Scholar 

  20. Ora, L.: Safety standards in the ARM ecosystem. ARM Whitepaper, January 2015

    Google Scholar 

  21. Kempf, J., et al.: Thoughts on reliability in the internet of things. In: Interconnecting smart objects with the Internet workshop, vol. 1 (2011)

    Google Scholar 

  22. Linpner, S.: The trustworthy computing security development lifecycle. In: ACSAC 2004, pp. 2–13 (2004)

    Google Scholar 

  23. Security Considerations in the System Development Life Cycle (SP800-64 Revision2). NIST (2008)

    Google Scholar 

  24. Bormann, C., et al.: Terminology for Constrained-Node Networks (RFC7228). IETF, May 2014

    Google Scholar 

  25. Internet of Things Research Study 2014 Report, Hewlett Packard (2014)

    Google Scholar 

  26. Pescatore, J.: Securing the Internet of Things Survey. SANS Institute, January 2014

    Google Scholar 

  27. Ministry of Science, ICT and Future Planning, South Korea. http://www.msip.go.kr

  28. 10 Specialized Action Plans for IoT Development (2013-2015), Ministry of Industry and Information Technology, China

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Miyeon Yoon .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media Singapore

About this paper

Cite this paper

Yoon, M., Baek, J. (2015). A Study on Framework for Developing Secure IoT Service. In: Park, DS., Chao, HC., Jeong, YS., Park, J. (eds) Advances in Computer Science and Ubiquitous Computing. Lecture Notes in Electrical Engineering, vol 373. Springer, Singapore. https://doi.org/10.1007/978-981-10-0281-6_42

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0281-6_42

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0280-9

  • Online ISBN: 978-981-10-0281-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics