Abstract
There is an increasing interest in IoT-enabled smart digital systems. However, it is important to address their security concerns. This paper aims to address this need and proposes an adaptive architecture driven approach to securing IoT systems. The paper proposes IoT security principles and a foundational adaptive architecture framework. These two combined provide a guide to design and embed the security across various layers of an IoT system. This will ensure that the important aspects of the IoT security are not accidentally missed, and thus provides a holistic end to end adaptive architecture driven approach for IoT security. This paper covers the interaction, human, digital technology, physical facility and environment architecture layers and principles related to IoT security as opposed to focusing only on the IoT devices. Thus, it demonstrates and concludes that the IoT security is much more than IoT device, network and perimeter security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Othman, N.A., Aydin, I.: A face recognition method in the internet of things for security applications in smart homes and cities. In: 6th International Istanbul Smart Grids and Cities Congress and Fair (ICSG) (2018)
Bashir, M.R., Gill, A.Q.: IoT enabled smart buildings: a systematic review. In: IEEE Intelligent Systems Conference (IntelliSys), pp. 151–159 (2017)
Bader, A., Ghazzai, H., Kadri, A., Alouini, M.S.: Front-end intelligence for large-scale application-oriented internet-of-things. IEEE Access 4, 3257–3272 (2016)
Gill, A.Q., Phennel, N., Lane, D., Phung, V.L.: IoT-enabled emergency information supply chain architecture for elderly people: the Australian context. Inf. Syst. 58, 75–86 (2016)
Dong, L., Mingyue, R., Guoying, M.: Application of internet of things technology on predictive maintenance system of coal equipment. Procedia Eng. 174, 885–889 (2017)
Gay, V., Leijdekkers, P., Gill, A. and Felix, N.K.: Le Bon Samaritain: A Community-Based Care Model Supported by Technology. Studies in health technology and informatics, (2015)
Gill, A.Q., Behbood, V., Ramadan-Jradi, R., Beydoun, G.: IoT architectural concerns: a systematic review. In: Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing (ICC 2017), pp. 1–9 (2017)
Korhonen, J.J., Lapalme, J., McDavid, D., Gill, A.Q.: Adaptive enterprise architecture for the future: towards a reconceptualization of EA. In: IEEE 18th Conference on Business Informatics (CBI), pp. 272–281 (2016)
Gill, A.Q.: Applying agility and living service systems thinking to enterprise architecture. Int. J. Intell. Inf. Technol. (IJIIT) 10, 1–15 (2014)
TOGAF 9.2. The Open Group Architecture Framework (2018)
Gill, A.Q.: Adaptive cloud enterprise architecture. World Sci. (2015)
ISO/IEC/IEEE 42010. Defining architecture
The Gill Framework. http://www.adaptinn.com/the-gill-framework/
Anwar, M.J., Gill, A.Q.: A review of the seven modelling approaches for digital ecosystem architecture. In: 2019 IEEE 21st Conference on Business Informatics (CBI), Moscow, Russia, pp. 94–103 (2019)
Gill, A.Q., Chew, E.: Configuration information system architecture: insights from applied action design research. Inf. Manage. 56(4), 507–525 (2019)
Madhuri, M., Gill, A.Q., Khan, H.U.: IoT-enabled smart child safety digital system architecture. In: IEEE 14th International Conference on Semantic Computing (ICSC), San Diego, CA, USA, pp. 166–169 (2020)
ACSC. Securing the Internet of Things for Consumers. Draft Code of Practice (2019)
Dasgupta, A., Gill, A.Q., Hussain, F.: Privacy of IoT-enabled smart home systems. In: Internet of Things (IoT) for Automated and Smart Applications. IntechOpen (2019)
Gill, A.Q., Bunker, D.: Crowd sourcing challenges assessment index for disaster management. In: 18th Americas Conference on Information Systems (2012)
Micrrosoft. Azure IoT reference architecture (2020). https://docs.microsoft.com/en-us/azure/architecture/reference-architectures/iot/
Nahar, K., Gill, A.Q.: A review towards the development of ontology based identity and access management metamodel. In: WAINA. Springer (2020)
Doherty, N.F., Anastasakis, L., Fulford, H.: Reinforcing the security of corporate information resources: a critical review of the role of the acceptable use policy. Int. J. Inf. Manage. 31(3), 201–209 (2011)
Cha, I.H.: A study on the development of personnel security management for protection against insider threat. J. Korea Inst. Electron. Commun. Sci. 3(4), 210–220 (2008)
Lopez-Lorca, A.A., Beydoun, G., Valencia-Garcia, R., Martinez-Bejar, R.: Supporting agent-oriented requirement analysis with ontologies. Int. J. Hum. Comput. Stud. 87(3), 20–37 (2016)
Beydoun, G., Low, G., Tran, N., Bogg, P.: Development of a peer-to-peer information sharing system using ontologies. Expert Syst. Appl. 38(8), 9352–9364 (2011)
Acknowledgments
We wish to extend our sincere thanks to the anonymous reviewers of this paper who helped us with their valuable feedback, which helped us to improve the quality of this paper.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Gill, A.Q., Beydoun, G., Niazi, M., Khan, H.U. (2021). Adaptive Architecture and Principles for Securing the IoT Systems. In: Barolli, L., Poniszewska-Maranda, A., Park, H. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing . IMIS 2020. Advances in Intelligent Systems and Computing, vol 1195. Springer, Cham. https://doi.org/10.1007/978-3-030-50399-4_17
Download citation
DOI: https://doi.org/10.1007/978-3-030-50399-4_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-50398-7
Online ISBN: 978-3-030-50399-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)