Ensuring IoT/M2M system security under the limitation of constrained gateways

Kuan Lin Chen, Fuchun Lin*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

The Internet of Things (IoT)/Machine to Machine (M2M) service must provide security mechanisms to avoid illegal usage of the service. However, in some situation the gateways involved in the IoT/M2M systems are resource-constrained. Hence, the commonly used Transport Layer Security (TLS) protocol cannot be readily applicable to ensure the security of the IoT/M2M systems. Our research focuses on providing IoT/M2M system security under the limitation of constrained gateways. We design a security mechanism on top of the security framework defined in the oneM2M standard to address this problem. Furthermore, we implement this mechanism on the OM2M platform and evaluate it in terms of cost and performance.

Original languageEnglish
Title of host publicationSecurity, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2017 International Workshops, Proceedings
EditorsGuojun Wang, Zheng Yan, Kim-Kwang Raymond Choo, Mohammed Atiquzzaman
PublisherSpringer Verlag
Pages302-311
Number of pages10
ISBN (Print)9783319723945
DOIs
StatePublished - 1 Jan 2017
Event10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2017 - Guangzhou, China
Duration: 12 Dec 201715 Dec 2017

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10658 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2017
CountryChina
CityGuangzhou
Period12/12/1715/12/17

Keywords

  • Authentication
  • IoT
  • M2M
  • OneM2M
  • Resource-constrained
  • Security

Fingerprint Dive into the research topics of 'Ensuring IoT/M2M system security under the limitation of constrained gateways'. Together they form a unique fingerprint.

Cite this