Abstract
In the era of the Internet, people can interconnect and obtain information via the network. Through the combinational use of network and various wireless communication sensing networks, objects can now communicate with each other through the Internet environment. Furthermore, as IT evolves and as IPv6 technology eventually matures, data transmission can be carried out between smart objects by using sensing networks, networking, and computing functions. This concept which is emerging into a network environment is known as the Internet of Things (IoT). However, the related researches of the IoT have not discussed the data insecurity issues. This study establishes security level agreements to ameliorate excessive computational loads with the lightweight security mechanism so that data can be protected in the perception layer, then the computational cost of data encrypted in the perception layer.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Andrieux, A., Karl, C., Dan, A., Keahey, K., Ludwig, H., Nakata, T., Pruyne, J., Rofrano, J., Tuecke, S., Xu, M.: Web services agreement specification (WS-agreement). In: Open Grid Forum, vol. 128 (2007)
Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)
Chan, H., Perrig, A.: PIKE: peer intermediaries for key establishment in sensor networks. In: Proceeding of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 1, pp. 524–535 (2005)
Coetzee, L., Eksteen, J.: The internet of things-promise for the future an introduction. In: Proceedings of IST-Africa Conference, pp. 1–9 (2011)
Gavras, A., Karila, A., Fdida, S., May, M., Potts, M.: Future internet research and experimentation: the fire initiative. ACM SIGCOMM Comput. Commun. Rev. 37(3), 89–92 (2007)
Gershenfeld, N., Krikorian, R., Cohen, D.: The internet of things. Sci. Am. 291, 76–81 (2004)
He, M., Ren, C., Wang, Q., Shao, B., Dong, J.: The internet of things as an enabler to supply chain innovation. In: Proceedings of the International Conference on e-Business Engineering (ICEBE), pp. 326–331 (2010)
Henning, R.R.: Security service level agreements: quantifiable security for the enterprise? In: Proceeding of the ACM Workshop on New Security Paradigms, pp. 54–60 (1999)
ITU Internet Reports: The Internet of Things. International Telecommunication Union, Geneva (2005)
Jara, A.J., Zamora, M.A., Skarmeta, A.: Global IP: an adaptive and transparent ipv6 integration in the internet of things. In: Proceedings of the Mobile Information Systems, vol. 8, no. 3, pp. 177–197 (2012)
Lee, H., Kim, Y.H., Lee, D.H., Lim, J.: Classification of key management schemes for wireless sensor networks. In: Proceeding of the International Workshop on Application and Security Service in Web and PervAsive eNvironments, vol. 4537, pp. 664–673 (2007)
Lin, M., Zhang, J.: The application and development of internet of things with its solutions of restrictive factors. In: Proceedings of the International Conference on Mechatronic Science, Electric Engineering and Computer (MEC), pp. 282–285 (2011)
Lu, T., Neng, W.: Future internet: the internet of things. In: Proceedings of the International Conference on Advanced Computer Theory and Engineering, vol. 5, pp. 376–380 (2010)
Luigi, A., Antonio, I., Giacomo, M.: The internet of things: a survey. Comput. Netw. 54, 2787–2805 (2010)
Luna, J., Ghani, H., Vateva, T., Suri, N.: Quantitative assessment of cloud security level agreements: a case study. In: Proceedings of Security and Cryptography, pp. 64–73 (2012)
Perrig, A., Szewczyk, R., Wen, V., Cullar, D., Tygar, J.D.: SPINS: security protocols for sensor networks. Wirel. Netw. 8(5), 521–534 (2002)
Sarma, A.C., João, J.: Identities in the future internet of things. Wirel. Pers. Commun. 49(3), 353–363 (2009)
Sarma, S.E., Weis, S.A., Engels, D.W.: RFID systems and security and privacy implications. In: Proceeding of the 4th International Workshop on Cryptographic Hardware and Embedded Systems, pp. 454–469 (2002)
Schoenen, R., Walke, B.H.: On PHY and MAC performance of 3G-LTE in a multi-hop cellular environment. In: Proceeding of the International Conference on Wireless Communications, Networking and Mobile Computing, pp. 926–929 (2007)
Wang, B.: Review on internet of things. J. Electron. Meas. Instrum. 23(12), 1–7 (2009)
Wang, S.C., Chen, C.W., Wang, S.S., Yan, K.Q.: To achieve data availability and reliability by a middleware framework underlying the IoT environment. In: BAI2013 International Conference on Business and Information, Bali, Indonesia, pp. E24–E31, 07–09 July 2013
Welbourne, E., Battle, L., Cole, G., Gould, K., Rector, K., Raymer, S., Balazinska, M., Borriello, G.: Building the internet of things using RFID: the RFID ecosystem experience. In: Proceedings of the IEEE Internet Computing, vol. 13, no. 3, pp. 48–55 (2009)
Xue, Y., Zhihua, L., Zhenmin, G., Haitao, Z.: A multi-layer security model for internet of things. In: Internet of Things. Communications in Computer and Information Science, vol. 312, pp 388–393 (2012)
Yen, S.P., Talwar, S., Lee, S.C., Kim, H.: WiMax femtocells: a perspective on network architecture, capacity, and coverage. IEEE Commun. Mag. 46(10), 58–65 (2008)
Zhou, Q., Zhang, J.: Research prospect of internet of things geography. In: Proceeding of the 19th International Conference on Geoinformatics, pp. 1–5 (2011)
Dekker, M., Hogben, G.: Survey and analysis of security parameters in cloud SLAs across the european public sector. European Union Agency for Network and Information Security. https://www.enisa.europa.eu/activities/Resilience-and-CIIP/cloud-computing/survey-and-analysis-of-security-parameters-in-cloud-slas-across-the-european-public-sector
IBM: Smarter planet-United States. http://www.ibm.com/smarterplanet/us/en/
Acknowledgment
The authors like to thank the Ministry of Science and Technology, ROC (MOST-106-2221-E-324 -009) to support this research.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Wang, SC., Lin, YJ., Yan, KQ., Chen, CW. (2019). Security Enhancement of Internet of Things Using Service Level Agreements and Lightweight Security. In: Arai, K., Kapoor, S., Bhatia, R. (eds) Advances in Information and Communication Networks. FICC 2018. Advances in Intelligent Systems and Computing, vol 887. Springer, Cham. https://doi.org/10.1007/978-3-030-03405-4_15
Download citation
DOI: https://doi.org/10.1007/978-3-030-03405-4_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-03404-7
Online ISBN: 978-3-030-03405-4
eBook Packages: EngineeringEngineering (R0)