Security Enhancement of Internet of Things Using Service Level Agreements and Lightweight Security

  • Shu-Ching Wang
  • Ya-Jung Lin
  • Kuo-Qin YanEmail author
  • Ching-Wei Chen
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 887)


In the era of the Internet, people can interconnect and obtain information via the network. Through the combinational use of network and various wireless communication sensing networks, objects can now communicate with each other through the Internet environment. Furthermore, as IT evolves and as IPv6 technology eventually matures, data transmission can be carried out between smart objects by using sensing networks, networking, and computing functions. This concept which is emerging into a network environment is known as the Internet of Things (IoT). However, the related researches of the IoT have not discussed the data insecurity issues. This study establishes security level agreements to ameliorate excessive computational loads with the lightweight security mechanism so that data can be protected in the perception layer, then the computational cost of data encrypted in the perception layer.


Internet of Things Security level agreements Digital signature 



The authors like to thank the Ministry of Science and Technology, ROC (MOST-106-2221-E-324 -009) to support this research.


  1. 1.
    Andrieux, A., Karl, C., Dan, A., Keahey, K., Ludwig, H., Nakata, T., Pruyne, J., Rofrano, J., Tuecke, S., Xu, M.: Web services agreement specification (WS-agreement). In: Open Grid Forum, vol. 128 (2007)Google Scholar
  2. 2.
    Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)CrossRefGoogle Scholar
  3. 3.
    Chan, H., Perrig, A.: PIKE: peer intermediaries for key establishment in sensor networks. In: Proceeding of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 1, pp. 524–535 (2005)Google Scholar
  4. 4.
    Coetzee, L., Eksteen, J.: The internet of things-promise for the future an introduction. In: Proceedings of IST-Africa Conference, pp. 1–9 (2011)Google Scholar
  5. 5.
    Gavras, A., Karila, A., Fdida, S., May, M., Potts, M.: Future internet research and experimentation: the fire initiative. ACM SIGCOMM Comput. Commun. Rev. 37(3), 89–92 (2007)CrossRefGoogle Scholar
  6. 6.
    Gershenfeld, N., Krikorian, R., Cohen, D.: The internet of things. Sci. Am. 291, 76–81 (2004)CrossRefGoogle Scholar
  7. 7.
    He, M., Ren, C., Wang, Q., Shao, B., Dong, J.: The internet of things as an enabler to supply chain innovation. In: Proceedings of the International Conference on e-Business Engineering (ICEBE), pp. 326–331 (2010)Google Scholar
  8. 8.
    Henning, R.R.: Security service level agreements: quantifiable security for the enterprise? In: Proceeding of the ACM Workshop on New Security Paradigms, pp. 54–60 (1999)Google Scholar
  9. 9.
    ITU Internet Reports: The Internet of Things. International Telecommunication Union, Geneva (2005)Google Scholar
  10. 10.
    Jara, A.J., Zamora, M.A., Skarmeta, A.: Global IP: an adaptive and transparent ipv6 integration in the internet of things. In: Proceedings of the Mobile Information Systems, vol. 8, no. 3, pp. 177–197 (2012)CrossRefGoogle Scholar
  11. 11.
    Lee, H., Kim, Y.H., Lee, D.H., Lim, J.: Classification of key management schemes for wireless sensor networks. In: Proceeding of the International Workshop on Application and Security Service in Web and PervAsive eNvironments, vol. 4537, pp. 664–673 (2007)Google Scholar
  12. 12.
    Lin, M., Zhang, J.: The application and development of internet of things with its solutions of restrictive factors. In: Proceedings of the International Conference on Mechatronic Science, Electric Engineering and Computer (MEC), pp. 282–285 (2011)Google Scholar
  13. 13.
    Lu, T., Neng, W.: Future internet: the internet of things. In: Proceedings of the International Conference on Advanced Computer Theory and Engineering, vol. 5, pp. 376–380 (2010)Google Scholar
  14. 14.
    Luigi, A., Antonio, I., Giacomo, M.: The internet of things: a survey. Comput. Netw. 54, 2787–2805 (2010)CrossRefGoogle Scholar
  15. 15.
    Luna, J., Ghani, H., Vateva, T., Suri, N.: Quantitative assessment of cloud security level agreements: a case study. In: Proceedings of Security and Cryptography, pp. 64–73 (2012)Google Scholar
  16. 16.
    Perrig, A., Szewczyk, R., Wen, V., Cullar, D., Tygar, J.D.: SPINS: security protocols for sensor networks. Wirel. Netw. 8(5), 521–534 (2002)CrossRefGoogle Scholar
  17. 17.
    Sarma, A.C., João, J.: Identities in the future internet of things. Wirel. Pers. Commun. 49(3), 353–363 (2009)CrossRefGoogle Scholar
  18. 18.
    Sarma, S.E., Weis, S.A., Engels, D.W.: RFID systems and security and privacy implications. In: Proceeding of the 4th International Workshop on Cryptographic Hardware and Embedded Systems, pp. 454–469 (2002)CrossRefGoogle Scholar
  19. 19.
    Schoenen, R., Walke, B.H.: On PHY and MAC performance of 3G-LTE in a multi-hop cellular environment. In: Proceeding of the International Conference on Wireless Communications, Networking and Mobile Computing, pp. 926–929 (2007)Google Scholar
  20. 20.
    Wang, B.: Review on internet of things. J. Electron. Meas. Instrum. 23(12), 1–7 (2009)Google Scholar
  21. 21.
    Wang, S.C., Chen, C.W., Wang, S.S., Yan, K.Q.: To achieve data availability and reliability by a middleware framework underlying the IoT environment. In: BAI2013 International Conference on Business and Information, Bali, Indonesia, pp. E24–E31, 07–09 July 2013Google Scholar
  22. 22.
    Welbourne, E., Battle, L., Cole, G., Gould, K., Rector, K., Raymer, S., Balazinska, M., Borriello, G.: Building the internet of things using RFID: the RFID ecosystem experience. In: Proceedings of the IEEE Internet Computing, vol. 13, no. 3, pp. 48–55 (2009)CrossRefGoogle Scholar
  23. 23.
    Xue, Y., Zhihua, L., Zhenmin, G., Haitao, Z.: A multi-layer security model for internet of things. In: Internet of Things. Communications in Computer and Information Science, vol. 312, pp 388–393 (2012)Google Scholar
  24. 24.
    Yen, S.P., Talwar, S., Lee, S.C., Kim, H.: WiMax femtocells: a perspective on network architecture, capacity, and coverage. IEEE Commun. Mag. 46(10), 58–65 (2008)CrossRefGoogle Scholar
  25. 25.
    Zhou, Q., Zhang, J.: Research prospect of internet of things geography. In: Proceeding of the 19th International Conference on Geoinformatics, pp. 1–5 (2011)Google Scholar
  26. 26.
    Dekker, M., Hogben, G.: Survey and analysis of security parameters in cloud SLAs across the european public sector. European Union Agency for Network and Information Security.
  27. 27.
    IBM: Smarter planet-United States.

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Shu-Ching Wang
    • 1
  • Ya-Jung Lin
    • 1
  • Kuo-Qin Yan
    • 2
    Email author
  • Ching-Wei Chen
    • 1
  1. 1.Department of Information ManagementChaoyang University of TechnologyTaichungTaiwan, ROC
  2. 2.Department of Business AdministrationChaoyang University of TechnologyTaichungTaiwan, ROC

Personalised recommendations