A Secure Network Architecture for the Internet of Things Based on Local Authorization Entities
Hokeun Kim, Armin Wasicek, Edward A. Lee

Citation
Hokeun Kim, Armin Wasicek, Edward A. Lee. "A Secure Network Architecture for the Internet of Things Based on Local Authorization Entities". Talk or presentation, 14, October, 2015; Poster presented at the 2015 TerraSwarm Annual Meeting.

Abstract
The Internet of Things (IoT) is considered to have a great potential to impact on everyday life through its connectivity. However, applications for the IoT would be limited without sufficient security guarantees, and security measures for the traditional Internet may not properly address issues regarding the IoT. In this paper, we propose a secure network architecture with key distribution mechanisms using local authorization entities and three groups of entities according to their connectivity with respect to the authorization entity. Our proposed architecture provides security guarantees while addressing IoT-specific issues including resource constraints and heterogeneity of devices. Through security analysis and comparison with previous approaches, we show our proposed approach has advantages for the IoT while providing a comparable level of security as other approaches.

Electronic downloads


Internal. This publication has been marked by the author for TerraSwarm-only distribution, so electronic downloads are not available without logging in.
Citation formats  
  • HTML
    Hokeun Kim, Armin Wasicek, Edward A. Lee. <a
    href="http://www.terraswarm.org/pubs/664.html"><i>A
    Secure Network Architecture for the Internet of Things Based
    on Local Authorization Entities</i></a>, Talk or
    presentation,  14, October, 2015; Poster presented at the
    <a
    href="http://terraswarm.org/conferences/15/annual"
    >2015 TerraSwarm Annual Meeting</a>.
  • Plain text
    Hokeun Kim, Armin Wasicek, Edward A. Lee. "A Secure
    Network Architecture for the Internet of Things Based on
    Local Authorization Entities". Talk or presentation, 
    14, October, 2015; Poster presented at the <a
    href="http://terraswarm.org/conferences/15/annual"
    >2015 TerraSwarm Annual Meeting</a>.
  • BibTeX
    @presentation{KimWasicekLee15_SecureNetworkArchitectureForInternetOfThingsBasedOnLocal,
        author = {Hokeun Kim and Armin Wasicek and Edward A. Lee},
        title = {A Secure Network Architecture for the Internet of
                  Things Based on Local Authorization Entities},
        day = {14},
        month = {October},
        year = {2015},
        note = {Poster presented at the <a
                  href="http://terraswarm.org/conferences/15/annual"
                  >2015 TerraSwarm Annual Meeting</a>},
        abstract = {The Internet of Things (IoT) is considered to have
                  a great potential to impact on everyday life
                  through its connectivity. However, applications
                  for the IoT would be limited without sufficient
                  security guarantees, and security measures for the
                  traditional Internet may not properly address
                  issues regarding the IoT. In this paper, we
                  propose a secure network architecture with key
                  distribution mechanisms using local authorization
                  entities and three groups of entities according to
                  their connectivity with respect to the
                  authorization entity. Our proposed architecture
                  provides security guarantees while addressing
                  IoT-specific issues including resource constraints
                  and heterogeneity of devices. Through security
                  analysis and comparison with previous approaches,
                  we show our proposed approach has advantages for
                  the IoT while providing a comparable level of
                  security as other approaches.},
        URL = {http://terraswarm.org/pubs/664.html}
    }
    

Posted by Hokeun Kim on 13 Oct 2015.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.