{"title":"Architecture and security considerations for Internet of Things","authors":"M. Gomba, B. Nleya","doi":"10.1109/GWS.2017.8300477","DOIUrl":null,"url":null,"abstract":"The current IP and other networks such as Power Smart Grids are fast evolving thus resulting in diverse connectivity methodologies. This has led to the emergence of \"the Internet of Things (IoT) methodology whose goal is to transform the current IP and related networks to Machine-to-Machine (M-2-M) basis. It will seamlessly interconnect the globe and cyberspace via physical objects that embed with intelligent sensors of varying types, this resulting in voluminous generation and exchange of data by an excess of 20 billion Internet-connected objects and sensors (things) soon (by 2020), [1]. The resultant structure will benefit mankind by helping us make tough decisions as well as be provisioned of beneficial services. In this paper, we overview both IoT architecture as well as security for IoT associated objects and devices. We will commence with a description of a generalized IoT and security architecture as well as how the various elements constituting them interact. We describe an approach that allows the protection of both constrained and unconstrained IoT devices through robust encryption as well as authentication, so that both can equally leverage from the same security framework, but still maintaining low computational loads, by avoiding excessive computational operations.","PeriodicalId":380950,"journal":{"name":"2017 Global Wireless Summit (GWS)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Global Wireless Summit (GWS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GWS.2017.8300477","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13
Abstract
The current IP and other networks such as Power Smart Grids are fast evolving thus resulting in diverse connectivity methodologies. This has led to the emergence of "the Internet of Things (IoT) methodology whose goal is to transform the current IP and related networks to Machine-to-Machine (M-2-M) basis. It will seamlessly interconnect the globe and cyberspace via physical objects that embed with intelligent sensors of varying types, this resulting in voluminous generation and exchange of data by an excess of 20 billion Internet-connected objects and sensors (things) soon (by 2020), [1]. The resultant structure will benefit mankind by helping us make tough decisions as well as be provisioned of beneficial services. In this paper, we overview both IoT architecture as well as security for IoT associated objects and devices. We will commence with a description of a generalized IoT and security architecture as well as how the various elements constituting them interact. We describe an approach that allows the protection of both constrained and unconstrained IoT devices through robust encryption as well as authentication, so that both can equally leverage from the same security framework, but still maintaining low computational loads, by avoiding excessive computational operations.