Home| Contact Us| New Journals| Browse Journals| Journal Prices| For Authors|

Print ISSN: 2349-8161
Online ISSN: 2349-817X


  About ISEJ
  Home
Aims & Scope
Editorial Board
Current Issue
Next Issue
Previous Issue
Self-archiving policy
Alert Services
Be a Reviewer
Publisher
Paper Submission
Contact us
 
  For Authors
  Guidelines for Contributors
Online Submission
Statement of Ethics and Responsibilities
Review Policies
Transfer of Copyright
Archiving Policy
Call for Papers
 
 
RELATED JOURNALS
Journal of Digital Information Management (JDIM)
Journal of Multimedia Processing and Technologies (JMPT)
International Journal of Web Application (IJWA)

 

 
Information Security Education Journal (ISEJ)
 

Security Education in the IoT Reference Architecture
Evelina Pencheva
Faculty of Telecommunications, Technical University of Sofia, Kl. Ohridski 8, 1000 Sofia Bulgaria
Abstract: This work has addressed the security education in the Internet of Things. It describes the communication between one to other device and service access issues. The limitations in web services have impact on the security aspects of IoT. The newer security functions are discussed with a functional system of IoT reference architecture. The mutual authentication and service agreement signing are explained further.
Keywords: Internet of Thing, Reference Architectural Model, constrained Web Services, security, privacy Security Education in the IoT Reference Architecture
DOI:https://doi.org/10.6025/isej/2022/9/1/1-7
Full_Text   PDF 748 KB   Download:   94  times
References:

[1] ITU Internet Reports. The Internet of Things (2005) (Ed. 2005).
[2] Infso, D. Networked enterprise & RFID INFSO G.2 Micro & Nanosystems, in cooperation with the WG on RFID of the ETP EPOSS, ‘”Internet of Things in 2020. Roadmap for the Future, vol 1, pp. 1–27 (2008).
[3] Bekiarski, A., Altimirski, E. & Pleshkova, S. (2010) Multimedia surveillance station for audio-visual objects tracking with mobile robot. In: Proceedings of the of International Conferences of Systems, Greece, pp. 240–247.
[4] Galluccio, L., Morabito, G. & Palazzo, S. (2011) On the potentials of object group localization in the Internet of things. In: Proceedings of the of IEEE International Symposium on World of Wireless, Mobile and Multimedia Networks WoWMoM’2011, pp. 1–9 [DOI: 10.1109/WoWMoM.2011.5986489].
[5] Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S.L., Kumar, S.S. & Wehrle, K. (2011) Security challenges in the IP-based Internet of things. Wireless Personal Communications, 61, 527–542 [DOI: 10.1007/s11277-011-0385-5].
[6] Pleshkova, S. (2011) Algorithm of feature estimation for real time objects detection in thermal images. In: Proceedings of the of International Conference on Computational Intelligence, Man-Machine Systems and Cybernetics. CIMMACS: Jakarta, pp. 209–215.
[7] Park, S. et al. (2011). “IPv6 over Low Power WPAN Security Analysis”, Internet Draft.
[8] Weber, R.H. (2010) Internet of Things – New security and privacy challenges. Computer Law and Security Review, 26, 23–30 [DOI: 10.1016/j.clsr.2009.11.008].
[9] Li, T. & Chen, L. (2012) Internet of things: Principle, framework and application. Future Wireless Networks and Information Systems, Springer LNEE, 144, 477–482.
[10] Serbanati, A., Medaglia, C., Ceipidor, U. “Building Blocks of the Internet of Things: State of the Art and Beyond” (2011), Chapter 20. In: edited book “Deploying RFID - Challenges. Solutions, and Open Issues.
[11] Roman, R., Najera, P. & Lopez, J. (2011) Securing the Internet of things. Computer, 44, 51–58 [DOI: 10.1109/MC.2011.291].
[12] Mayer, C. (2009) Security and privacy challenges in the Internet of things. Electronic Communications of the EASST, 17, 1– 12.
[13] Castellani, A.P., Gheda, M., Bui, N., Rossi, M. & Zorzi, M. (2011) Web services for the Internet of things through CoAP and EXI. In: Proceedings of the of IEEE International Conference on Communications Workshops, pp. 1–6 [DOI: 10.1109/ iccw.2011.5963563].
[14] Suo, H., Wan, J., Zou, C. & Liu, J. (2012) Security in the Internet of things: A review. In: Proceedings of the of International Conference on Computer and Electronics Engineering ICCSEE, Vol. 3, pp. 648–651 [DOI: 10.1109/ICCSEE.2012.373].
[15] Kranenburg, R. et al. (2011) The Internet of things. In: Proceedings of the of Berlin Symposium on Internet and Security.
[16] FP7 project Internet of things – Architecture (2012). “Introduction to the Architectural Reference Model for the Internet of Things”. www.iot-a.eu/arm/d1.3.
[17] ZigBee. www.zigbee.org/.
[18] Ramon, S. (2011) ZigBee alliance completes ZigBee building automation standard, BACnet. Default.aspx?Contenttype=ArticleDet&tabID=332&moduleId= 806&Aid=354&PR=PR. www.zigbee.org/.
[19] DALI. www.dalibydesign.us/dali.html.
[20] Kushalnagar, N., Montenegro, G. & Schmacher, C. (2007) IPv6 over low-power wireless personal area networks (6LoWPANs): Overview, assumptions, problem statement, and goals. RFC, 4919.
[21] Shelby, Z. (2012). Constrained RESTful Environments (CoRE) Link Format, RFC, Vol. 6690.
[22] Shelby, Z. et al. (2012). Constrained Application Protocol (CoAP), Internet Draft.
[23] Mozkowitz, R. (2011). “HIP Diet Exchange (DEX)”, Internet Draft.


Copyright 2013 socio.org.uk