• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

Feasibility of Societal Model for Securing Internet of Things

Vol. 12, No. 8, August 30, 2018
10.3837/tiis.2018.08.003 , Download Paper (Free):

Abstract

In the Internet of Things (IoT) concept, devices communicate autonomously with applications in the Internet. A significant aspect of IoT that makes it stand apart from present-day networked devices and applications is a) the very large number of devices, produced by diverse makers and used by an even more diverse group of users; b) the applications residing and functioning in what were very private sanctums of life e.g. the car, home, and the people themselves. Since these diverse devices require high-level security, an operational model for an IoT system is required, which has built-in security. We have proposed the societal model as a simple operational model. The basic concept of the model is borrowed from human society – there will be infants, the weak and the handicapped who need to be protected by guardians. This natural security mechanism works very well for IoT networks which seem to have inherently weak security mechanisms. In this paper, we discuss the requirements of the societal model and examine its feasibility by doing a proof-of-concept implementation.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
H. Tsunoda, R. Roman, J. Lopez and G. M. Keeni, "Feasibility of Societal Model for Securing Internet of Things," KSII Transactions on Internet and Information Systems, vol. 12, no. 8, pp. 3567-3588, 2018. DOI: 10.3837/tiis.2018.08.003 .

[ACM Style]
Hiroshi Tsunoda, Rodrigo Roman, Javier Lopez, and Glenn Mansfield Keeni. 2018. Feasibility of Societal Model for Securing Internet of Things. KSII Transactions on Internet and Information Systems, 12, 8, (2018), 3567-3588. DOI: 10.3837/tiis.2018.08.003 .