Secure Synthesis of IoT via Readers-Writers Flow Model

3Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Internet of Things (IoT) is a game changer for the connected society. Safe and reliable operation of IoT connected devices is of paramount importance and thus, security and privacy is a foundational enabler for IoT. In this paper, we arrive at a synthesis methodology for the IoT and demonstrate how information flow among the connected devices using a three tier architecture enables us to assess the required security and privacy of the IoT based on the given security and privacy capabilities of the components. Our methodology uses a recent information security model called RWFM (Readers-Writers Flow Model) and shows how flexible approaches of synthesis of IoT through frameworks like Django can be integrated to realize the security/privacy requirements of the IoT. We demonstrate how the methodology concretely enables us to derive the constraints to be satisfied by the underlying components and enabled communications. A case study of a healthcare IoT implementation is discussed to illustrate the advantages of the methodology.

Cite

CITATION STYLE

APA

Khobragade, S., Narendra Kumar, N. V., & Shyamasundar, R. K. (2018). Secure Synthesis of IoT via Readers-Writers Flow Model. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10722 LNCS, pp. 86–104). Springer Verlag. https://doi.org/10.1007/978-3-319-72344-0_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free