IDEAS home Printed from https://ideas.repec.org/a/sae/intdis/v16y2020i11p1550147720974535.html
   My bibliography  Save this article

Build with intrinsic security: Trusted autonomy security system

Author

Listed:
  • Shen He
  • Jing Huang
  • Penglin Yang

Abstract

Security of Internet of things network is difficult to manage because Internet of things devices are heterogeneous and always deployed in remote places. Based on these features, attacks against Internet of things network like distributed denial-of-service and system intrusion are easier than traditional network. In order to enhance Internet of things network’s security, in this article we propose the concept of intrinsic security to establish a trusted and autonomy Internet of things network. Intrinsic security emphasizes that network itself must be trusted and security autonomous to address the security problems which are caused by remote and heterogeneous. Based on this thought, we designed the architecture of Trusted Autonomy Security System. Trusted Autonomy Security System maintains a LAN characterized by trusted and security autonomy, in which all Internet of things network gateways formed a decentralized autonomy system to evaluate if other gateways or Internet of things devices are secure. Compared to traditional Internet of things networks, this architecture uses trusted computing technique to build the basic of security, and makes Internet of things network available to manage security automatically. In addition, the decentralized architecture could reduce security risks caused by compromise of single node in Internet of things network. With these advantages, it can be expected that this novel idea will have more development in Internet of things scenarios with high security requirements.

Suggested Citation

  • Shen He & Jing Huang & Penglin Yang, 2020. "Build with intrinsic security: Trusted autonomy security system," International Journal of Distributed Sensor Networks, , vol. 16(11), pages 15501477209, November.
  • Handle: RePEc:sae:intdis:v:16:y:2020:i:11:p:1550147720974535
    DOI: 10.1177/1550147720974535
    as

    Download full text from publisher

    File URL: https://journals.sagepub.com/doi/10.1177/1550147720974535
    Download Restriction: no

    File URL: https://libkey.io/10.1177/1550147720974535?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. R. Riesco & X. Larriva-Novo & V. A. Villagra, 2020. "Cybersecurity threat intelligence knowledge exchange based on blockchain," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 73(2), pages 259-288, February.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Soumyadeb Chowdhury & Oscar Rodriguez-Espindola & Prasanta Dey & Pawan Budhwar, 2023. "Blockchain technology adoption for managing risks in operations and supply chain management: evidence from the UK," Annals of Operations Research, Springer, vol. 327(1), pages 539-574, August.
    2. Rodríguez-Espíndola, Oscar & Chowdhury, Soumyadeb & Dey, Prasanta Kumar & Albores, Pavel & Emrouznejad, Ali, 2022. "Analysis of the adoption of emergent technologies for risk management in the era of digital manufacturing," Technological Forecasting and Social Change, Elsevier, vol. 178(C).

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:sae:intdis:v:16:y:2020:i:11:p:1550147720974535. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: SAGE Publications (email available below). General contact details of provider: .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.