@inproceedings {Clarke:2012, title = {Trust \& Security RTD in the Internet of Things: Opportunities for International Cooperation}, booktitle = {Proceedings of the First International Conference on Security of Internet of Things}, series = {SecurIT {\textquoteright}12}, year = {2012}, pages = {172{\textendash}178}, publisher = {ACM}, organization = {ACM}, address = {New York, NY, USA}, abstract = {

While there has been considerable progress in the research and technological development (RTD) of the Internet of Things (IoT), there is still considerable RTD required by international communities for the trust, privacy and security research challenges arising from the constitution of the IoT architectures, infrastructures, communications, devices, objects, applications and services. In this paper, we present an thorough analysis of the ongoing and future RTD work, specifically in Europe, regarding trust, privacy and security of the Internet of Things with a view towards enabling international cooperation efforts around the globe to solve these major research challenges.

}, keywords = {international cooperation (INCO), Internet of Things, privacy, research and technological development (RTD), security, Trust}, isbn = {978-1-4503-1822-8}, doi = {10.1145/2490428.2490452}, url = {http://doi.acm.org/10.1145/2490428.2490452}, author = {Clarke, James and Roman, Rodrigo and Sharma, Abhishek and Lopez, Javier and Suri, Neeraj} } @article {roman2011, title = {Key management systems for sensor networks in the context of the Internet of Things}, journal = {Computers \& Electrical Engineering}, volume = {37}, year = {2011}, month = {Mar 2011}, pages = {147-159}, publisher = {Elsevier}, abstract = {

If a wireless sensor network (WSN) is to be completely integrated into the Internet as part of the Internet of Things (IoT), it is necessary to consider various security challenges, such as the creation of a secure channel between an Internet host and a sensor node. In order to create such a channel, it is necessary to provide key management mechanisms that allow two remote devices to negotiate certain security credentials (e.g. secret keys) that will be used to protect the information flow. In this paper we will analyse not only the applicability of existing mechanisms such as public key cryptography and pre-shared keys for sensor nodes in the IoT context, but also the applicability of those link-layer oriented key management systems (KMS) whose original purpose is to provide shared keys for sensor nodes belonging to the same WSN.

}, issn = {0045-7906}, doi = {10.1016/j.compeleceng.2011.01.009}, url = {http://www.sciencedirect.com/science/article/B6V25-527FRSD-1/2/62661c595153993639c43b9b331d8d66}, author = {Rodrigo Roman and Cristina Alcaraz and Javier Lopez and Nicolas Sklavos} }