Scroll Top

SPRINT

Security Services PlatfoRm for the INternet of Things

Project Overview: 

The Internet of Things (IoT) depicts an scenario where both the virtual and real world interweave by embedding sensors, actuators, RFID tags and other similar technologies in everyday objects. Furthermore, such objects will be connected to the Internet providing the network with real-time information. In this landscape, a new range of security services is expected. Consequently, the goal of this project is to develop a Security Services Platform to facilitate future software developers the seamless integration of secure services into their software specifically designed for the IoT scenario.

The SPRINT platform requires an in-depth analysis of the original IoT security requirements since it introduces significant differences in comparison with traditional Internet scenarios [1][2][3]. The development of basic and network security services is deemed critical for a fruitful integration of tiny limited devices with the current computer-based Internet [4]. More precisely, a secure network connectivity service [5] as well as a distributed intrusion detection service will be devised [6]. Also, the SPRINT platform will incorporate a service for trading off between security and quality of service, which is of vital importance given the extreme resource limitation of the involved objects.

The aforementioned services will provide a basis for the development of advanced security services specifically redesigned for the IoT environment. An identity and privacy management service will provide a privacy-preserving identification scheme depending on the requirements of the other communicating party, whether a human or another object. Also, a trust management service in order for objects to determine what relationships might be established with each other. Moreover, a secure object location service will guarantee the localization of objects[7], an intrinsic problem to the interaction with the objects of the physical world. Finally, all these services will be integrated into the platform and evaluated.

References
  1. R. Roman, and J. Lopez, Integrating Wireless Sensor Networks and the Internet: A Security Analysis“, Internet Research, vol. 19, no. 2, Emerald, pp. 246-259, Mar 2009. DOI   (I.F.: 0.844)
  2. J. Lopez, R. Roman, and P. Najera, Los Desafíos de Seguridad en la Internet de los Objetos“, Revista SIC, vol. 88, Ediciones CODA, pp. 66-73, Feb 2010.  
  3. R. Roman, C. Alcaraz, J. Lopez, and N. Sklavos, Key management systems for sensor networks in the context of the Internet of Things“, Computers & Electrical Engineering, vol. 37, Elsevier, pp. 147-159, Mar 2011. DOI   (I.F.: 0.837)More..
  4. C. Alcaraz, R. Roman, P. Najera, and J. Lopez, Acceso seguro a redes de sensores en SCADA a través de Internet“, XI Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2010), pp. 337-342, September, 2010.  
  5. C. Alcaraz, P. Najera, J. Lopez, and R. Roman, Wireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration?“, 1st International Workshop on the Security of the Internet of Things (SecIoT’10), IEEE, pp. xxxx, December, 2010.   
  6. C. Alcaraz, A. Balastegui, and J. Lopez, Early Warning System for Cascading Effect Control in Energy Control Systems“,
    5th International conference on Critical Information Infrastructures Security (CRITIS’10), LNCS 6712, Springer, pp. 55-67, September, 2010.   
  7. R. Rios, and J. Lopez, Source Location Privacy Considerations in Wireless Sensor Networks“, 4th International Symposium of Ubiquitous Computing and Ambient Intelligence (UCAmI’10), L. Fuentes, N. Gámez, and J. Bravo Eds., IBERGARCETA PUBLICACIONES, S.L., pp. 29 – 38, Sept., 2010.