Skip to Main content Skip to Navigation

Building a secure infrastructure for IoT systems in distributed environments

Xiaoyang Zhu 1, 2
2 SOC - Service Oriented Computing
LIRIS - Laboratoire d'InfoRmatique en Image et Systèmes d'information
Abstract : The premise of the Internet of Things (IoT) is to interconnect not only sensors, mobile devices, and computers but also individuals, homes, smart buildings, and cities, as well as electrical grids, automobiles, and airplanes, to mention a few. However, realizing the extensive connectivity of IoT while ensuring user security and privacy still remains a challenge. There are many unconventional characteristics in IoT systems such as scalability, heterogeneity, mobility, and limited resources, which render existing Internet security solutions inadequate to IoT-based systems. Besides, the IoT advocates for peer-to-peer networks where users as owners intend to set security policies to control their devices or services instead of relying on some centralized third parties. By focusing on scientific challenges related to the IoT unconventional characteristics and user-centric security, we propose an IoT secure infrastructure enabled by the blockchain technology and driven by trustless peer-to-peer networks. Our IoT secure infrastructure allows not only the identification of individuals and collectives but also the trusted identification of IoT things through their owners by referring to the blockchain in trustless peer-to-peer networks. The blockchain provides our IoT secure infrastructure with a trustless, immutable and public ledger that records individuals and collectives identities, which facilitates the design of the simplified authentication protocol for IoT without relying on third-party identity providers. Besides, our IoT secure infrastructure adopts socialized IoT paradigm which allows all IoT entities (namely, individuals, collectives, things) to establish relationships and makes the IoT extensible and ubiquitous networks where owners can take advantage of relationships to set access policies for their devices or services. Furthermore, in order to protect operations of our IoT secure infrastructure against security threats, we also introduce an autonomic threat detection mechanism as the complementary of our access control framework, which can continuously monitor anomaly behavior of device or service operations.
Document type :
Complete list of metadatas

Cited literature [271 references]  Display  Hide  Download
Contributor : Abes Star :  Contact
Submitted on : Thursday, December 12, 2019 - 11:18:08 AM
Last modification on : Wednesday, July 8, 2020 - 12:43:35 PM
Long-term archiving on: : Friday, March 13, 2020 - 9:09:02 PM


Version validated by the jury (STAR)


  • HAL Id : tel-02406710, version 1


Xiaoyang Zhu. Building a secure infrastructure for IoT systems in distributed environments. Other [cs.OH]. Université de Lyon, 2019. English. ⟨NNT : 2019LYSEI038⟩. ⟨tel-02406710⟩



Record views


Files downloads