دورية أكاديمية

Secure IoT framework and 2D architecture for End-To-End security.

التفاصيل البيبلوغرافية
العنوان: Secure IoT framework and 2D architecture for End-To-End security.
المؤلفون: Choi, Jongseok, In, Youngjin, Park, Changjun, Seok, Seonhee, Seo, Hwajeong, Kim, Howon
المصدر: Journal of Supercomputing; Aug2018, Vol. 74 Issue 8, p3521-3535, 15p
مصطلحات موضوعية: INTERNET security, INTERNET of things, COMPUTER architecture, MEDICAL care, DATA encryption
مستخلص: In this paper, we proposed an secure IoT framework to ensure an End-To-End security from an IoT application to IoT devices. The proposed IoT framework consists of the IoT application, an IoT broker and the IoT devices. The IoT devices can be deployed along a board line or a boundary of the area of IoT broker. The IoT broker manages their own devices and aggregates their sensing data. The IoT application provides users with IoT services. To use the IoT services, it needs to access to sensing data. Especially, the case of real-time healthcare services should consider intermediate security issues because medical information of patients is one of very sensitive privacy information. However, most of IoT protocols such as CoAP and MQTT have no concern about the End-To-End security, they only depended on the security of DTLS. Therefore, we proposed a new IoT framework to satisfy the End-To-End security feature under the CoAP communication. The proposed framework encrypts sensitive data by a symmetric encryption and an attribute-based encryption for efficiencies of communication and computation costs. In addition, each IoT device has a unique identification used as one of their attributes. Consequently, although the IoT broker is one of the intermediate nodes, it decrypts and shows data only if it satisfies all attributes. [ABSTRACT FROM AUTHOR]
Copyright of Journal of Supercomputing is the property of Springer Nature and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
قاعدة البيانات: Complementary Index
الوصف
تدمد:09208542
DOI:10.1007/s11227-016-1684-0