Cyber-Physical-Social Based Security Architecture for Future Internet of Things
Huansheng Ning, Hong Liu
DOI: 10.4236/ait.2012.21001   PDF    HTML     13,572 Downloads   31,391 Views   Citations


As the Internet of Things (IoT) is emerging as an attractive paradigm, a typical IoT architecture that U2IoT (Unit IoT and Ubiquitous IoT) model has been presented for the future IoT. Based on the U2IoT model, this paper proposes a cyber-physical-social based security architecture (IPM) to deal with Information, Physical, and Management security perspectives, and presents how the architectural abstractions support U2IoT model. In particular, 1) an information security model is established to describe the mapping relations among U2IoT, security layer, and security requirement, in which social layer and additional intelligence and compatibility properties are infused into IPM; 2) physical security referring to the external context and inherent infrastructure are inspired by artificial immune algorithms; 3) recommended security strategies are suggested for social management control. The proposed IPM combining the cyber world, physical world and human social provides constructive proposal towards the future IoT security and privacy protection.

Share and Cite:

H. Ning and H. Liu, "Cyber-Physical-Social Based Security Architecture for Future Internet of Things," Advances in Internet of Things, Vol. 2 No. 1, 2012, pp. 1-7. doi: 10.4236/ait.2012.21001.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] H. Ning, “RFID Major Projects and State Internet of Things (Second Edition),” China Machine Press, Beijing, 2010.
[2] J. Ma, J. Wen, R. Huang and B. Huang, “Cyber-Individual Meets Brain Informatics,” IEEE Intelligent Systems, Vol. 26, No. 5, 2011, pp. 30-37. doi:10.1109/MIS.2011.55
[3] L. Atzori, A. Iera and G. Morabito, “The Internet of Things: A Survey,” Computer Networks, Vol. 54, No. 15, 2010, pp. 2787-2805. doi:10.1016/j.comnet.2010.05.010
[4] D. Bandyopadhyay and J. Sen, “Internet of Things: Applications and Challenges in Technology and Standardization,” Wireless Personal Communications, Vol. 58, No. 1, 2011, pp. 49-69. doi:10.1007/s11277-011-0288-5
[5] H. Ning, N. Ning, S. Qu, Y. Zhang and H. Yang, “Layered Structure and Management in Internet of Things,” Proceedings of Future Generation Communication and Networking (FGCN 2007), Jeju, 6-8 December 2007, pp. 386-389.
[6] R. Roman, P. Najera and J. Lopez, “Securing the Internet of Things,” Computer, Vol. 44, No. 9, 2011, pp. 51-58. doi:10.1109/MC.2011.291
[7] R. Kaur, “Advances in Intrusion Detection System for WLAN,” Advances in Internet of Things, Vol. 1, No. 3, 2011, pp. 51-54. doi:10.4236/ait.2011.13007
[8] G. P. Hancke, K. Markantonakis and K. E. Mayes, “Security Challenges for User-Oriented RFID Applications within the ‘Internet of Things’,” Journal of Internet Technology, Vol. 11, No. 3, 2010, pp. 307-313.
[9] R. Roman, C. Alcaraz, J. Lopez and N. Sklavos, “Key Management Systems for Sensor Networks in the Context of the Internet of Things,” Computers & Electrical Engineering, Vol. 37, No. 2, 2011, pp. 147-159. doi:10.1016/j.compeleceng.2011.01.009
[10] L. D. Xu, “Information Architecture for Supply Chain Quality Management,” International Journal of Production Research, Vol. 49, No. 1, 2011, pp. 183-198. doi:10.1080/00207543.2010.508944
[11] L. Zhou and H. C. Chao, “Multimedia Traffic Security Architecture for the Internet of Things,” IEEE Network, Vol. 25, No. 3, 2011, pp. 35-40. doi:10.1109/MNET.2011.5772059
[12] H. Ning and Z. Wang, “Future Internet of Things Architecture: Like Mankind Neural System or Social Organization Framework?” IEEE Communications Letters, Vol. 15, No. 4, 2011, pp. 461-463. doi:10.1109/LCOMM.2011.022411.110120
[13] Draft ITU-T Recommendation X.805 (Formerly X.css), Security Architecture for Systems Providing End-to-End communications, 2003.
[14] D. Havlik, S. Schade, Z. A. Sabeur , P. Mazzetti, K. Watson, A. J. Berre and J. L. Mon, “From Sensor to Observation Web with Environmental Enablers in the Future Internet,” Sensors, Vol. 11, No. 4, 2011, pp. 3874-3907. doi:10.3390/s110403874
[15] L. Atzori, A. Iera and G. Morabito, “The Internet of Things: A Survey,” Computer Networks, Vol. 54, No. 15, 2010, pp. 2787-2805. doi:10.1016/j.comnet.2010.05.010
[16] N. Koshizuka and K. Sakamura, “Ubiquitous ID: Standards for Ubiquitous Computing and the Internet of Things,” IEEE Pervasive Computing, Vol. 9, No. 4, 2010, pp. 98-101. doi:10.1109/MPRV.2010.87
[17] P. K. Harmer, P. D. Williams, G. H. Gunsch, G. B. Lamont, “An Artificial Immune System Architecture for Computer Security Applications,” IEEE Transactions on Evolutionary Computation, Vol. 6, No. 3, 2002, pp. 252-280. doi:10.1109/TEVC.2002.1011540

Copyright © 2023 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.