Vadiraja A
Asistant Professor, Dept. Of ISE
RVCE, Bengaluru
th
Reliable Transmission
Safe and complete transfer of the information objects through the
wireless or wired network to the data centre in real time.
Intelligent Processing
Middleware analyses and deals with the collected information
before submitting to application terminal eventually.
Literature Survey
1. A Survey on the Internet of Things Security by Kai Zhao, Lina Ge, Ninth International Conference
on Computational Intelligence and Security 2013
1. Introduction to the architecture and features of IoT security
2. Expounds several security issues of IoT that exist in the three-layer system structure.
3. Perception layer safety measures are elaborated, including key management and algorithm, security
routing protocol, data fusion technology, as well as authentication and access control, etc.
2. Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things,
Huansheng Ning, Hong Liu, Laurence T. Yang, IEEE - 2015
1. Design of an aggregated-proof based hierarchical authentication scheme (APHA) for the layered
networks.
2. Different access authorities are assigned to achieve hierarchical access control.
3. Secure IoT framework and 2D architecture for End-To-End Security, Jongseok Choi, Youngjin In,
Changjun Park, Seonhee Seok, Hwanjeong Seo, Howon Kim , Springer - 2016
1. Proposes a Secure IoT framework for End-to-End security from an IoT application to IoT devices.
2. Talks about the IoT Application, an IoT Broker and the IoT devices.
3. The proposed framework encrypts sensitive data by a symmetric encryption and an attribute-based
encryption
4. A Hierarchical Security Architecture for Cyber-Physical Systems, Quanyan Zhu, Craig Rieger and
Tamer Baar, IEEE - 2011
1. Discusses a hierarchical viewpoint to IoT security issues, addressing security concerns at each level
and emphasizing a holistic cross-layer philosophy for developing security solutions.
2. Proposes a bottom-up framework that establishes a model from the physical and control levels to the
supervisory level, incorporating concerns from network and communication levels.
Methodology to be followed
Aim - 1:
Summary
References - 1
[1] Kai Zhao, Lina Ge, A Survey on the Internet of Things Security, Ninth International Conference on
Computational Intelligence and Security, CIS.2013.145, 2013
[2] Jorge Granjal, Edmundo Monteiro, Security for the Internet of Things: A Survey of Existing Protocols and
Open Research Issues, IEEE COMMUNICATION SURVEYS & TUTORIALS, VOL. 17, NO. 3, THIRD
QUARTER 2015
[3] Hui Suo, Jiafu Wan, Security in the Internet of Things: A Review, Computer Science and Electronics
Engineering (ICCSEE), 2012 International Conference, 10.1109/ICCSEE.2012.373, 2012
[4] Mohamed Abomhara, Geir M. Kien, Security and privacy in the Internet of Things: Current status and
open issues, Privacy and Security in Mobile Systems (PRISMS), 2014 International Conference,
10.1109/PRISMS.2014.6970594, 2014
[5] Quandeng Gou, Lianshan Yan, Yihe Liu, Yao Li, Construction and Strategies in IoT Security System,
IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE
Cyber, Physical and Social Computing, GreenCom-iThings-CPSCom.2013.195, 2013
References - 2
[6] Huansheng Ning, Hong Liu, Laurence T. Yang, Aggregated-Proof Based Hierarchical Authentication
Scheme for the Internet of Things, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED
[9] Jongseok Choi, Youngjin In, Changjun Park, Seonhee Seok, Hwanjeong Seo, Howon Kim ,
Secure IoT framework and 2D architecture for End-To-End Security,
Springer
[10] Quanyan Zhu, Craig Rieger and Tamer Baar, A Hierarchical Security Architecture for
Cyber-Physical Systems, 978-1-4244-9293-0/11 IEEE, 2011
Thank You
- Vadiraja Acharya