Security Architecture Development in Internet of Things Operating Systems
Title | Security Architecture Development in Internet of Things Operating Systems |
Publication Type | Conference Paper |
Year of Publication | 2022 |
Authors | Sachindra, U. G. T., Rajapaksha, U. U. S. |
Conference Name | 2022 International Research Conference on Smart Computing and Systems Engineering (SCSE) |
Date Published | Sep. |
Keywords | 6LoWPAN, composability, Contiki, IoT, Memory management, Network security, Operating systems, privacy, Protocols, pubcrawl, resilience, Resiliency, Systems engineering and theory, Wireless sensor networks, WSN |
Abstract | Due to the widespread use of the Internet of Things (IoT) in recent years, the need for IoT technologies to handle communications with the rest of the globe has grown dramatically. Wireless sensor networks (WSNs) play a vital role in the operation of the IoT. The creation of Internet of Things operating systems (OS), which can handle the newly constructed IoT hardware, as well as new protocols and procedures for all communication levels, all of which are now in development, will pave the way for the future. When compared to other devices, these gadgets require a comparatively little amount of electricity, memory, and other resources. This has caused the scientific community to become more aware of the relevance of IoT device operating systems as a result of their findings. These devices may be made more versatile and powerful by including an operating system that contains real-time capabilities, kernel, networking, and other features, among other things. IEEE 802.15.4 networks are linked together using IPv6, which has a wide address space and so enables more devices to connect to the internet using the 6LoWPAN protocol. It is necessary to address some privacy and security issues that have arisen as a result of the widespread use of the Internet, notwithstanding the great benefits that have resulted. For the Internet of Things operating systems, this research has provided a network security architecture that ensures secure communication by utilizing the Cooja network simulator in combination with the Contiki operating system and demonstrate and explained how the nodes can protect from the network layer and physical layer attacks. Also, this research has depicted the energy consumption results of each designated node type during the authentication and communication process. Finally, proposed a few further improvements for the architecture which will enhance the network layer protection. |
DOI | 10.1109/SCSE56529.2022.9905160 |
Citation Key | 9905160 |