59 research outputs found
Security and privacy issues of physical objects in the IoT: Challenges and opportunities
In the Internet of Things (IoT), security and privacy issues of physical objects are crucial to the related applications. In order to clarify the complicated security and privacy issues, the life cycle of a physical object is divided into three stages of pre-working, in-working, and post-working. On this basis, a physical object-based security architecture for the IoT is put forward. According to the security architecture, security and privacy requirements and related protecting technologies for physical objects in different working stages are analyzed in detail. Considering the development of IoT technologies, potential security and privacy challenges that IoT objects may face in the pervasive computing environment are summarized. At the same time, possible directions for dealing with these challenges are also pointed out
Industrielle Echtzeitsysteme aus der Perspektive der verteilten Datenverarbeitung
Changeability is becoming a competitive factor for manufacturing companies in today's dynamic markets. Service-oriented architectures (SOAs) achieve high adaptability but usually lack the required real-time guarantees. This thesis applies principles from distributed data processing systems to SOAs in industrial manufacturing. The automation workflow is described as a network of service instances and the data flow between them. Using domain specific heuristics, the system derives distributed execution plans with verifiable real-time guarantees. These principles are realized within a real-world demonstrator.Anpassungsfähigkeit wird zu einem wichtigen Erfolgsfaktor für Industrieunternehmen auf den globalen Märkten. Service-orientierte Architekturen (SOAs) sind geeignet um eine hohe Anpassbarkeit zu erreichen, ihnen mangelt es aber meist an der nötigen Echtzeitfähigkeit. Diese Dissertation wendet Prinzipien der verteilten Datenverarbeitung auf SOAs in industriellen Echtzeitsystemen an. Die Automatisierungsaufgabe wird als Netzwerk von Serviceinstanzen, sowie dem Datenfluss dazwischen, beschrieben. Davon werden mittels domänenspezifischen Heuristiken Ausführungspläne abgeleitet, die über nachprüfbare Echtzeitgarantien verfügen. Diese Prinzipien werden in einem Echtweltdemonstrator verdeutlicht
A DTLS Based End-To-End Security Architecture for the Internet of Things with Two-Way Authentication
Secure and Cost-effective Application Layer Protocol with Authentication Interoperability for IOT
DTLS based security and two-way authentication for the Internet of Things
In this paper, we introduce the first fully implemented two-way authentication security scheme for the Internet of Things (IoT) based on existing Internet standards, specifically the Datagram Transport Layer Security (DTLS) protocol. By relying on an established standard, existing implementations, engineering techniques and security infrastructure can be reused, which enables easy security uptake. Our proposed security scheme is therefore based on RSA, the most widely used public key cryptography algorithm. It is designed to work over standard communication stacks that offer UDP/IPv6 networking for Low power Wireless Personal Area Networks (6LoWPANs). Our implementation of DTLS is presented in the context of a system architecture and the scheme’s feasibility (low overheads and high interoperability) is further demonstrated through extensive evaluation on a hardware platform suitable for the Internet of Things
Machine ballets don't need conductors: Towards scheduling-based service choreographies in a real-time SOA for industrial automation
- …
