Abstract
IoT is an intelligent collaboration of tiny sensors and devices giving new challenges to security and privacy in end to end communication of things. Protection of data and privacy of things is one of the key challenges in the IoT. Lack of security measures will result in decreased adoption among users and therefore is one of the driving factors in the success of the IoT. This paper gives an overview, analysis and taxonomy of security and privacy challenges in IoT. Finally, Security Model for IoT has been proposed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Silverajan, B., Harju, J.: Developing network software and communications protocols towards the internet of things. In: Proceedings of the Fourth International ICST Conference on Communication System Software and MiddlewaRE, COMSWARE 2009, Dublin, Ireland, June 16-19, pp. 1–8. ACM, New York (2009)
Adjie-Winoto, W., Schwartz, E., Balakrishnan, H., Lilley, J.: The design and implementation of an intentional naming system. In: Proceedings of the Seventeenth ACM Symposium on Operating Systems Principles, SOSP 1999, Charleston, South Carolina, US, December 12-15, pp. 186–201. ACM, New York (1999)
Beerliova, Z., Eberhard, F., Erlebach, T., Hall, A., Hoffmann, M., Mihalák, M., Ram, L.S.: Network Discovery and Verification. IEEE Journal on Selected Areas in Communications 24(12), 2168–2181 (2006)
Hu, Y.-C., Wang, H.J.: Location Privacy in Wireless Networks. In: Proceedings of the ACM SIGCOMM Asia Workshop (2005)
Kocher, P., Lee, R., McGraw, G., Raghunathan, A.: Security as a new dimension in embedded system design. In: Proceedings of the 41st Annual Design Automation Conference, DAC 2004, San Diego, CA, USA, June 7-11, pp. 753–760. ACM, New York (2004)
Welch, D., Lathrop, S.: Wireless security threat taxonomy. In: Information Assurance Workshop, IEEE Systems, Man and Cybernetics Society, June 18-20, pp. 76–83 (2003)
Public-Key Infrastructure (X.509), http://tools.ietf.org/wg/pkix/
Kohnfelder, L.M.: Towards a Practical Public Key System, Thesis (1978), http://dspace.mit.edu/bitstream/handle/1721.1/15993/07113748.pdf
Neuman, B.C., Ts’o, T.: Kerberos: an authentication service for computer networks. IEEE Communications Magazine 32(9), 33–38 (1994)
Introduction to Windows Live ID, download, http://msdn.microsoft.com/enus/library/bb288408.aspx/
OpenID, http://openid.net/specs/openid-authentication-1_1.html
Introduction to the Liberty Alliance Identity Architecture (2003), http://xml.coverpages.org/LibertyAllianceArchitecture200303.pdf
Goodner, M.: Understanding WS-Federation (2007), http://msdn.microsoft.com/en-us/library/bb498017.aspx
Shim, S.S.Y., Bhalla, P.: Federated identity management. IEEE Computer 38(12), 120–122 (2005)
Chappell, D.: Introducing Windows CardSpace, http://msdn.microsoft.com/en-us/library/aa480189.aspx
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Babar, S., Mahalle, P., Stango, A., Prasad, N., Prasad, R. (2010). Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT). In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_42
Download citation
DOI: https://doi.org/10.1007/978-3-642-14478-3_42
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14477-6
Online ISBN: 978-3-642-14478-3
eBook Packages: Computer ScienceComputer Science (R0)