Deakin University
Browse

File(s) under permanent embargo

Securing the internet of things infrastructure – standards and techniques

conference contribution
posted on 2014-01-01, 00:00 authored by Zubair BaigZubair Baig
The Internet of Things (IoT) infrastructure is a conglomerate of electronic devices interconnected through the Internet, with the purpose of providing prompt and effective service to end-users. Applications running on an IoT infrastructure generally handle sensitive information such as a patient's healthcare record, the position of a logistic vehicle, or the temperature readings obtained through wireless sensor nodes deployed in a bushland. The protection of such information from unlawful disclosure, tampering or modification, as well as the unscathed presence of IoT devices, in adversarial environments, is of prime concern. In this paper, a descriptive analysis of the security of standards and technologies for protecting the IoT communication channel from adversarial threats is provided. In addition, two paradigms for securing the IoT infrastructure, namely, common key based and paired key based, are proposed.

History

Pagination

75-81

Location

Perth, W.A.

Start date

2014-12-01

End date

2014-12-03

ISBN-13

9780729807180

Language

eng

Publication classification

E1.1 Full written paper - refereed

Editor/Contributor(s)

[Unknown]

Title of proceedings

AISM 2014 : Proceedings of 12th Australian Information Security Management Conference

Event

Information Security Management. Conference (12th : 2014 : Perth, W.A.)

Publisher

Edith Cowan University

Place of publication

Melbourne, Vic.

Series

Information Security Management Conference

Usage metrics

    Research Publications

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC