This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Securing the Internet of Things
Sept. 2011 (vol. 44 no. 9)
pp. 51-58
Rodrigo Roman, University of Malaga, Spain
Pablo Najera, University of Malaga, Spain
Javier Lopez, University of Malaga, Spain
In the Internet of Things vision, every physical object has a virtual component that can produce and consume services. Such extreme interconnection will bring unprecedented convenience and economy, but it will also require novel approaches to ensure its safe and ethical use.

1. B. Daskala ed., Flying 2.0—Enabling Automated Air Travel by Identifying and Addressing the Challenges of IoT & RFID Technology, European Network and Information Security Agency, 2010; www.enisa.europa.eu/media/press-releases flying-2.0-study-of-internet-of-things-rfid-in-air-travel .
2. O. Garcia-Morchon et al., "Security Considerations in the IP-Based Internet of Things," IETF, Mar. 2011; http://tools.ietf.org/htmldraft-garcia-core-security .
3. R. Roman, J. Lopez, and P. Najera, "A Cross-layer Approach for Integrating Security Mechanisms in Sensor Networks Architectures," Wireless Comm. and Mobile Computing, vol. 11, no. 2, 2011, pp. 267-276.
4. S. Raza, T. Voigt, and U. Roedig, "6LoWPAN Extension for IPsec," Proc. Workshop Interconnecting Smart Objects with the Internet, Internet Architecture Board, Mar. 2011; www.iab.org/about/workshopssmartobjects.
5. R. Roman et al., "Key Management Systems for Sensor Networks in the Context of the Internet of Things," Computers & Electrical Eng., Mar. 2011, pp. 147-159.
6. H. Akram and M. Hoffmann, "Support for Identity Management in Ambient Environments—The Hydra Approach," Proc. IEEE Int'l Conf. Advances in Human-Oriented and Personalized Mechanisms, Technologies, and Services (I-CENTRIC 08), IEEE CS Press, 2008, pp. 371-377.
7. A. Sarma and J. Girão, "Identities in the Future Internet of Things," Wireless Personal Comm., Mar. 2009, pp. 353-363.
8. E. Rekleitis, P. Rizomiliotis, and S. Gritzalis, "A Holistic Approach to RFID Security and Privacy," Proc. 1st Int'l Workshop Security of the Internet of Things (SecIoT 10), Network Information and Computer Security Laboratory, 2010; www.nics.uma.es/seciot10/files/pdfrekleitis_seciot10_paper.pdf .
9. J. Sen, "Privacy Preservation Technologies in Internet of Things," Proc. Int'l Conf. Emerging Trends in Mathematics, Technology, and Management, 2011; http://arxiv.org/ftp/arxiv/papers/10121012.2177.pdf .
10. G. Broenink et al., "The Privacy Coach: Supporting Customer Privacy in the Internet of Things," Proc. Workshop What Can the Internet of Things Do for the Citizen? (CIOT 2010); Radboud Univ., May 2010; http://dare.ubn.ru.nl/bitstream/2066/83839/ 183839.pdf.
11. S. Radomirovic, "Towards a Model for Security and Privacy in the Internet of Things," Proc. 1st Int'l Workshop Security of the Internet of Things (SecIoT 10), Network Information and Computer Security Laboratory, 2010; www.nics.uma.es/seciot10/files/pdfradomirovic_seciot10_paper.pdf .
1. H. Sundmaeker et al., eds., "Vision and Challenges for Realizing the Internet of Things," IoT European Research Cluster, Mar. 2010; www.internet-of-things-research.eu.
2. E. Fleisch, "What Is the Internet of Things? An Economic Perspective," white paper, WP-BIZAPP-053, AutoID Labs, Jan. 2010; www.autoidlabs.org.

Index Terms:
Internet of Things, Security protocols, Sensor networks, Virtual objects
Citation:
Rodrigo Roman, Pablo Najera, Javier Lopez, "Securing the Internet of Things," Computer, vol. 44, no. 9, pp. 51-58, Sept. 2011, doi:10.1109/MC.2011.291
Usage of this product signifies your acceptance of the Terms of Use.