Abstract

As the Internet of Things (IoT) is emerging as an attractive paradigm, a typical IoT architecture that U2IoT (Unit IoT and Ubiquitous IoT) model has been presented for the future IoT. Based on the U2IoT model, this paper proposes a cyber-physical-social based security architecture (IPM) to deal with Information, Physical, and Management security perspectives, and presents how the architectural abstractions support U2IoT model. In particular, 1) an information security model is established to describe the mapping relations among U2IoT, security layer, and security requirement, in which social layer and additional intelligence and compatibility properties are infused into IPM; 2) physical security referring to the external context and inherent infrastructure are inspired by artificial immune algorithms; 3) recommended security strategies are suggested for social management control. The proposed IPM combining the cyber world, physical world and human social provides constructive proposal towards the future IoT security and privacy protection.

Highlights

  • The Internet of Things (IoT) becomes an attractive research topic, in which the real entity in physical world becomes virtual entity in cyber world, and both physical and digital entities are enhanced with sensing, processing, and selfadapting capabilities to perform interaction through special addressing scheme [1]

  • Based on the U2IoT model, this paper proposes a cyber-physical-social based security architecture (IPM) to deal with Information, Physical, and Management security perspectives, and presents how the architectural abstractions support U2IoT model

  • 1) an information security model is established to describe the mapping relations among U2IoT, security layer, and security requirement, in which social layer and additional intelligence and compatibility properties are infused into IPM; 2) physical security referring to the external context and inherent infrastructure are inspired by artificial immune algorithms; 3) recommended security strategies are suggested for social management control

Read more

Summary

Introduction

The Internet of Things (IoT) becomes an attractive research topic, in which the real entity in physical world becomes virtual entity in cyber world, and both physical and digital entities are enhanced with sensing, processing, and selfadapting capabilities to perform interaction through special addressing scheme [1]. (named IPM) by integrating the awareness and interacttivity of cyber world, physical world, and human social into the U2IoT model. 1) information security model with the considerations for basic and advanced security requirements that are mapped into the security layer to deal with sensing, networking, application, and social attribution; 2) physical security including external context and inherent infrastructure are inspired by artificial immune, and it ensures that the things should be adaptable to dynamic semantic contexts with innate and adaptive immunities against malicious attacks; 3) management security provides recommended strategies for hierarchical classified scenes with rationality and compatibility. IPM realizes the unison of cyber world, physical world and human social to guarantee security and privacy for U2IoT.

Proposed Security Architecture for U2IoT
Information Security
Physical Security
Management Security
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call