Hierarchically defining Internet of Things security: From CIA to CACA

With the rapid development of Internet of Things technology (e.g. wireless sensor networks), security has become a global issue. Confidentiality, integrity, and availability (known as the CIA triangle) is widely used to define and model information security. However, this CIA triangle is insufficien...

Full description

Saved in:
Bibliographic Details
Main Authors: Lihua Yin, Binxing Fang, Yunchuan Guo, Zhe Sun, Zhihong Tian
Format: Article
Language:English
Published: Wiley 2020-01-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1177/1550147719899374
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849766209677950976
author Lihua Yin
Binxing Fang
Yunchuan Guo
Zhe Sun
Zhihong Tian
author_facet Lihua Yin
Binxing Fang
Yunchuan Guo
Zhe Sun
Zhihong Tian
author_sort Lihua Yin
collection DOAJ
description With the rapid development of Internet of Things technology (e.g. wireless sensor networks), security has become a global issue. Confidentiality, integrity, and availability (known as the CIA triangle) is widely used to define and model information security. However, this CIA triangle is insufficient to address rapidly changing security requirements. In this article, we divide information systems into four layers: physical layer, operational layer, data layer, and content layers (PODC). Corresponding, hierarchy of information security is proposed. Furthermore, we define the basic security properties for each layer and show that the four properties (i.e. confidentiality, availability, controllability, and authentication, called CACA) are minimally complete and independent for information security. Based on PODC and CACA, a new definition of information security is proposed, which acts as a secure foundation for information systems.
format Article
id doaj-art-c47f091e2443435e957ffd8ac66ec0cc
institution DOAJ
issn 1550-1477
language English
publishDate 2020-01-01
publisher Wiley
record_format Article
series International Journal of Distributed Sensor Networks
spelling doaj-art-c47f091e2443435e957ffd8ac66ec0cc2025-08-20T03:04:39ZengWileyInternational Journal of Distributed Sensor Networks1550-14772020-01-011610.1177/1550147719899374Hierarchically defining Internet of Things security: From CIA to CACALihua Yin0Binxing Fang1Yunchuan Guo2Zhe Sun3Zhihong Tian4Cyberspace Institute of Advanced Technology (CIAT), Guangzhou University, Guangzhou, Guangdong, ChinaCyberspace Institute of Advanced Technology (CIAT), Guangzhou University, Guangzhou, Guangdong, ChinaInstitute of Information Engineering, Chinese Academy of Sciences, Beijing, ChinaCyberspace Institute of Advanced Technology (CIAT), Guangzhou University, Guangzhou, Guangdong, ChinaCyberspace Institute of Advanced Technology (CIAT), Guangzhou University, Guangzhou, Guangdong, ChinaWith the rapid development of Internet of Things technology (e.g. wireless sensor networks), security has become a global issue. Confidentiality, integrity, and availability (known as the CIA triangle) is widely used to define and model information security. However, this CIA triangle is insufficient to address rapidly changing security requirements. In this article, we divide information systems into four layers: physical layer, operational layer, data layer, and content layers (PODC). Corresponding, hierarchy of information security is proposed. Furthermore, we define the basic security properties for each layer and show that the four properties (i.e. confidentiality, availability, controllability, and authentication, called CACA) are minimally complete and independent for information security. Based on PODC and CACA, a new definition of information security is proposed, which acts as a secure foundation for information systems.https://doi.org/10.1177/1550147719899374
spellingShingle Lihua Yin
Binxing Fang
Yunchuan Guo
Zhe Sun
Zhihong Tian
Hierarchically defining Internet of Things security: From CIA to CACA
International Journal of Distributed Sensor Networks
title Hierarchically defining Internet of Things security: From CIA to CACA
title_full Hierarchically defining Internet of Things security: From CIA to CACA
title_fullStr Hierarchically defining Internet of Things security: From CIA to CACA
title_full_unstemmed Hierarchically defining Internet of Things security: From CIA to CACA
title_short Hierarchically defining Internet of Things security: From CIA to CACA
title_sort hierarchically defining internet of things security from cia to caca
url https://doi.org/10.1177/1550147719899374
work_keys_str_mv AT lihuayin hierarchicallydefininginternetofthingssecurityfromciatocaca
AT binxingfang hierarchicallydefininginternetofthingssecurityfromciatocaca
AT yunchuanguo hierarchicallydefininginternetofthingssecurityfromciatocaca
AT zhesun hierarchicallydefininginternetofthingssecurityfromciatocaca
AT zhihongtian hierarchicallydefininginternetofthingssecurityfromciatocaca