Filters








939 Hits in 9.1 sec

Enabling Virtual AAA Management in SDN-Based IoT Networks †

Alejandro Molina Zarca, Dan Garcia-Carrillo, Jorge Bernal Bernabe, Jordi Ortiz, Rafael Marin-Perez, Antonio Skarmeta
2019 Sensors  
In this sense, this paper presents and evaluates a novel policy-based and cyber-situational awareness security framework for continuous and dynamic management of Authentication, Authorization, Accounting  ...  The increase of Software Defined Networks (SDN) and Network Function Virtualization (NFV) technologies is bringing many security management benefits that can be exploited at the edge of Internet of Things  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s19020295 fatcat:5o6pyk6tdbfnljt72gp3ulxis4

ARMY: architecture for a secure and privacy-aware lifecycle of smart objects in the internet of my things

Jose L. Hernandez-Ramos, Jorge Bernal Bernabe, Antonio Skarmeta
2016 IEEE Communications Magazine  
IoT-enabled services.  ...  The resulting architecture has been designed, instantiated, and implemented within the scope of different European IoT initiatives, in order to promote the design and development of secure and privacy-aware  ...  Economy and Competitiveness of Spain (including ERDF support).  ... 
doi:10.1109/mcom.2016.7565269 fatcat:q57krciawbcefd5wj6z4ahxqdm

Secure Authentication and Credential Establishment in Narrowband IoT and 5G

Jesus Sanchez-Gomez, Dan Garcia-Carrillo, Rafael Marin-Perez, Antonio F. Skarmeta
2020 Sensors  
The process of bootstrapping is required to establish a secure data exchange between IoT devices and data-driven platforms.  ...  The proposed solution is evaluated to prove its efficiency and feasibility, being one of the first efforts to support secure service authentication and key establishment for constrained IoT devices in  ...  Finally, the IoT device will establish a security association with the IoT controller through the EAP.  ... 
doi:10.3390/s20030882 pmid:32045992 pmcid:PMC7038755 fatcat:727vjddm2jaqzogy5niqcbs2t4

Establishment of Trust in Internet of Things by Integrating Trusted Platform Module: To Counter Cybersecurity Challenges

Mohammad Faisal, Ikram Ali, Muhammad Sajjad Khan, Su Min Kim, Junsu Kim, M. Irfan Uddin
2020 Complexity  
In the end, we integrated the trusted platform module in the IOT architecture to establish the trust in IOT computing and to enhance the cybersecurity challenges and evaluated it with the help of mathematical  ...  The current IOT computing infrastructure brings some security challenges concerned with the users/customers and CSP.  ...  Proposed work needs to be simulated on the basis of security services [18] Light-weight trusted scheme, that is, dynamic infrastructure trusted bootstrapping protocol (DITBP) based on TPM To establish  ... 
doi:10.1155/2020/6612919 fatcat:hkuoqyldnrbxfkcccvrtk4ipvy

Toward a Lightweight Authentication and Authorization Framework for Smart Objects

Jose L. Hernandez-Ramos, Marcin Piotr Pawlowski, Antonio J. Jara, Antonio F. Skarmeta, Latif Ladid
2015 IEEE Journal on Selected Areas in Communications  
The resulting architecture is intended to provide a holistic security approach to be leveraged in the design of novel and lightweight security protocols for IoT constrained environments.  ...  In this emerging ecosystem, the application of standard security technologies has to cope with the inherent nature of constrained physical devices, which are seamlessly integrated into the Internet infrastructure  ...  13.121, named BASTION "Bootstrapping, Authentication, Security and Trust for the Internet of Things Networks".  ... 
doi:10.1109/jsac.2015.2393436 fatcat:zjjuso7gvjdblkawalxd44ku5q

A survey of Key bootstrapping protocols based on Public Key Cryptography in the Internet of Things

Manisha Malik, Maitreyee Dutta, Jorge Granjal
2019 IEEE Access  
One of the major aspects among these is how keys are bootstrapped in devices, for the purpose of supporting secure communications.  ...  In this paper, we survey the state of the art in key bootstrapping protocols based on public-key cryptography in the Internet of Things.  ...  [56] propose a security architecture based on HIP and AMIKEY [86] , to support secure network associations and key management.  ... 
doi:10.1109/access.2019.2900957 fatcat:fbpg4ydg55bg5okyljo67hycqq

Security Challenges in the IP-based Internet of Things

Tobias Heer, Oscar Garcia-Morchon, René Hummen, Sye Loong Keoh, Sandeep S. Kumar, Klaus Wehrle
2011 Wireless personal communications  
We then present challenges and requirements for IP-based security solutions and highlight specific technical limitations of standard IP security protocols.  ...  In this paper, we discuss the applicability and limitations of existing Internet protocols and security architectures in the context of the Internet of Things.  ...  IP-based security solutions In the context of the IP-based IoT solutions, consideration of TCP/IP security protocols is important as these protocols are designed to fit the IP network ideology and technology  ... 
doi:10.1007/s11277-011-0385-5 fatcat:qgq2ahp7qbhgnb43mlayxgnjty

Integrating LPWAN technologies in the 5G ecosystem: A survey on security challenges and solutions

Jesus Sanchez-Gomez, Dan Garcia-Carrillo, Ramon Sanchez-Iborra, Jose L. Hernandez-Ramos, Jorge Granjal, Rafael Marin-Perez, Miguel A. Zamora-Izquierdo
2020 IEEE Access  
agriculture Integration of the LO-CoAP-EAP to carry out the initial authentication (bootstrapping) of NB-IoT devices Secure Session Key Management Scheme for Meter-Reading System Based on LoRa Technology  ...  No Yes Social IoT Establishment of a NB-IoT topology based on a trust and reputation model for IoT devices Reliable and Secure Constellation Shifting Aided Differential Radio Frequency Watermark  ... 
doi:10.1109/access.2020.3041057 fatcat:tosmrfrsm5dfne2pcswejhojni

IoTRoam - Design and implementation of an open LoRaWan roaming architecture

Sandoche Balakrichenan, Antoine Bernard, Michel Marot, Benoit Ampeau
2021 2021 IEEE Global Communications Conference (GLOBECOM)  
As a Proof-of-Concept, we have designed, implemented and tested a roaming LoRaWAN architecture using time-tested infrastructures on the Internet such as PKI and the DNS.  ...  The focus of IoTRoam is to set up an operational roaming model that scales, seamlessly embedded to existing IoT infrastructures and interconnects on a global basis with minimum initial configuration requirement  ...  ACKNOWLEDGEMENTS We want to acknowledge Orne Brocaar, the author of the Chirpstack LoRaWAN network stack, who has helped us to update the Chirpstack network stack to enable DNS based resolution; Prof.  ... 
doi:10.1109/globecom46510.2021.9685417 fatcat:ynorrytyvzezhmm3qyxqchz4z4

Enforcing Behavioral Profiles through Software-Defined Networks in the Industrial Internet of Things

Sara Nieves Matheu García, Alejandro Molina Zarca, José Luis Hernández-Ramos, Jorge Bernal Bernabé, Antonio Skarmeta Gómez
2019 Applied Sciences  
The fourth industrial revolution is being mainly driven by the integration of Internet of Things (IoT) technologies to support the development lifecycle of systems and products.  ...  In this direction, we propose a mechanism to manage securely the obtaining and enforcement of MUD policies through the use of a Software-Defined Network (SDN) architecture.  ...  In this work, we have proposed a proactive security approach to manage a secured and automated deployment of IoT devices behavioral profiles by using an SDN-enabled security architecture and standard technologies  ... 
doi:10.3390/app9214576 fatcat:a3i6kmsqajcdlepazvqjit42jq

Communication and Security in Machine-to-Machine Systems [chapter]

Iva Bojic, Jorge Granjal, Edmundo Monteiro, Damjan Katusic, Pavle Skocir, Mario Kusek, Gordan Jezic
2014 Lecture Notes in Computer Science  
Regarding the latter, we analyze how current standards and architecture of M2M systems define basic processes for secure connection establishment, and also discuss open issues, both in respect to aspects  ...  One of the main problems in the area is correlated with heterogeneous devices, which are using different technologies for communication.  ...  supported by two projects: "Machine-to-Machine Communication challenges" funded by Ericsson Nikola Tesla, Croatia, and iCIS project (CENTRO-07-ST24-FEDER-002003), which is co-financed by QREN, in the scope of  ... 
doi:10.1007/978-3-319-14116-9_14 fatcat:geymsjzhozaexjt7tls4gzny5a

Communication and Security in Machine-to-Machine Systems [chapter]

Iva Bojic, Jorge Granjal, Edmundo Monteiro, Damjan Katusic, Pavle Skocir, Mario Kusek, Gordan Jezic
2014 Lecture Notes in Computer Science  
Regarding the latter, we analyze how current standards and architecture of M2M systems define basic processes for secure connection establishment, and also discuss open issues, both in respect to aspects  ...  One of the main problems in the area is correlated with heterogeneous devices, which are using different technologies for communication.  ...  supported by two projects: "Machine-to-Machine Communication challenges" funded by Ericsson Nikola Tesla, Croatia, and iCIS project (CENTRO-07-ST24-FEDER-002003), which is co-financed by QREN, in the scope of  ... 
doi:10.1007/978-3-319-10834-6_14 fatcat:7iscxu7cajfulirstf5xrywp5y

Securing Gadget-Free Digital Services

Tanesh Kumar, Pawani Porambage, Ijaz Ahmad, Madhusanka Liyanage, Erkki Harjula, Mika Ylianttila
2018 Computer  
mechanism for enabling secure access to the gadgetfree digital services.  ...  This article proposes applying a three-tier communication and service architecture for such gadget-free environment, identifies its potential vulnerabilities and proposes a corresponding threetier security  ...  Based on the threat analysis, we propose three-tier security architecture for secure user accessibility for desired digital services in such gadget-free environment. II.  ... 
doi:10.1109/mc.2018.2876017 fatcat:h7a7vn4afrchxgzbksnamkrrhi

Lightweight CoAP-Based Bootstrapping Service for the Internet of Things

Dan Garcia-Carrillo, Rafael Marin-Lopez
2016 Sensors  
For this reason, in this work we propose a design and implementation of a lightweight bootstrapping service for IoT networks that leverages one of the application protocols used in IoT : Constrained Application  ...  Until now solutions have focused on re-using security protocols that were not developed for IoT constraints.  ...  Acknowledgments: We want to thank Raul Sanchez Sanchez for his initial work in the CoAP-EAP prototype; Pedro Moreno Sanchez for his insights on the implementation and testing of PANATIKI; Gabriel Lopez-Millan  ... 
doi:10.3390/s16030358 pmid:26978362 pmcid:PMC4813933 fatcat:qp7gxdgwdzbkzbmhhsctmpftj4

Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples

Riccardo Bonetto, Nicola Bui, Vishwas Lakkundi, Alexis Olivereau, Alexandru Serbanati, Michele Rossi
2012 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)  
In this paper we discuss security procedures for constrained IoT devices.  ...  We also discuss a practical example for the establishment of end-to-end secure channels between constrained and unconstrained devices.  ...  ACKNOWLEDGMENT This work has been supported in part by the European Commission through the FP7 EU project titled "Internet of Things-Architecture (IoT-A)" (G.A.no.257521, http://www.iot-a.eu/public).  ... 
doi:10.1109/wowmom.2012.6263790 dblp:conf/wowmom/BonettoBLOSR12 fatcat:t2khq2vehnchrhgk5dpb7advqy
« Previous Showing results 1 — 15 out of 939 results