A Comprehensive Security Architecture for Information Management throughout the Lifecycle of IoT Products

Author:

Yousefnezhad Narges1ORCID,Malhi Avleen12,Keyriläinen Tuomas1,Främling Kary13ORCID

Affiliation:

1. Department of Computer Science, Aalto University, 02150 Espoo, Finland

2. Department of Computing and Informatics, Bournemouth University, Poole BH12 5BB, UK

3. Department of Computing Science, Umeå University, 90187 Umeå, Sweden

Abstract

The Internet of things (IoT) is expected to have an impact on business and the world at large in a way comparable to the Internet itself. An IoT product is a physical product with an associated virtual counterpart connected to the internet with computational as well as communication capabilities. The possibility to collect information from internet-connected products and sensors gives unprecedented possibilities to improve and optimize product use and maintenance. Virtual counterpart and digital twin (DT) concepts have been proposed as a solution for providing the necessary information management throughout the whole product lifecycle, which we here call product lifecycle information management (PLIM). Security in these systems is imperative due to the multiple ways in which opponents can attack the system during the whole lifecycle of an IoT product. To address this need, the current study proposes a security architecture for the IoT, taking into particular consideration the requirements of PLIM. The security architecture has been designed for the Open Messaging Interface (O-MI) and Open Data Format (O-DF) standards for the IoT and product lifecycle management (PLM) but it is also applicable to other IoT and PLIM architectures. The proposed security architecture is capable of hindering unauthorized access to information and restricts access levels based on user roles and permissions. Based on our findings, the proposed security architecture is the first security model for PLIM to integrate and coordinate the IoT ecosystem, by dividing the security approaches into two domains: user client and product domain. The security architecture has been deployed in smart city use cases in three different European cities, Helsinki, Lyon, and Brussels, to validate the security metrics in the proposed approach. Our analysis shows that the proposed security architecture can easily integrate the security requirements of both clients and products providing solutions for them as demonstrated in the implemented use cases.

Funder

Finnish Foundation for Technology

European Union’s Horizon 2020

Publisher

MDPI AG

Subject

Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry

Reference50 articles.

1. Intelligent products—A step towards a more effective project delivery chain;Artto;Comput. Ind.,2003

2. Requirements on unique identifiers for managing product lifecycle information: Comparison of alternative approaches;Harrison;Int. J. Comput. Integr. Manuf.,2007

3. Research issues on product lifecycle management and information tracking using smart embedded systems;Kiritsis;Adv. Eng. Inform.,2003

4. Främling, K. (2016). A White Paper by: The Open Group Internet of Things (IoT) Work Group, The Open Group.

5. Security in product lifecycle of IoT devices: A survey;Yousefnezhad;J. Netw. Comput. Appl.,2020

Cited by 5 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. A systematic solution of distributed and trusted chain-network integration;Journal of Industrial Information Integration;2024-09

2. A Model to Protect Disaster Recovery Centers from Cyber Threats with Multi-Layered Network Security Architecture;2024-06-18

3. Total Experience Lifecycle Model:Based on Smart University Architecture;2024 20th CSI International Symposium on Artificial Intelligence and Signal Processing (AISP);2024-02-21

4. An Analysis of the Implementation of Blockchain Technology in Smart Grid Edge IoT Devices;2023 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC);2023-08-16

5. Quantifying IoT Security Parameters: An Assessment Framework;IEEE Access;2023

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3