Hierarchically defining Internet of Things security: From CIA to CACA
With the rapid development of Internet of Things technology (e.g. wireless sensor networks), security has become a global issue. Confidentiality, integrity, and availability (known as the CIA triangle) is widely used to define and model information security. However, this CIA triangle is insufficien...
Saved in:
| Main Authors: | , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2020-01-01
|
| Series: | International Journal of Distributed Sensor Networks |
| Online Access: | https://doi.org/10.1177/1550147719899374 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849766209677950976 |
|---|---|
| author | Lihua Yin Binxing Fang Yunchuan Guo Zhe Sun Zhihong Tian |
| author_facet | Lihua Yin Binxing Fang Yunchuan Guo Zhe Sun Zhihong Tian |
| author_sort | Lihua Yin |
| collection | DOAJ |
| description | With the rapid development of Internet of Things technology (e.g. wireless sensor networks), security has become a global issue. Confidentiality, integrity, and availability (known as the CIA triangle) is widely used to define and model information security. However, this CIA triangle is insufficient to address rapidly changing security requirements. In this article, we divide information systems into four layers: physical layer, operational layer, data layer, and content layers (PODC). Corresponding, hierarchy of information security is proposed. Furthermore, we define the basic security properties for each layer and show that the four properties (i.e. confidentiality, availability, controllability, and authentication, called CACA) are minimally complete and independent for information security. Based on PODC and CACA, a new definition of information security is proposed, which acts as a secure foundation for information systems. |
| format | Article |
| id | doaj-art-c47f091e2443435e957ffd8ac66ec0cc |
| institution | DOAJ |
| issn | 1550-1477 |
| language | English |
| publishDate | 2020-01-01 |
| publisher | Wiley |
| record_format | Article |
| series | International Journal of Distributed Sensor Networks |
| spelling | doaj-art-c47f091e2443435e957ffd8ac66ec0cc2025-08-20T03:04:39ZengWileyInternational Journal of Distributed Sensor Networks1550-14772020-01-011610.1177/1550147719899374Hierarchically defining Internet of Things security: From CIA to CACALihua Yin0Binxing Fang1Yunchuan Guo2Zhe Sun3Zhihong Tian4Cyberspace Institute of Advanced Technology (CIAT), Guangzhou University, Guangzhou, Guangdong, ChinaCyberspace Institute of Advanced Technology (CIAT), Guangzhou University, Guangzhou, Guangdong, ChinaInstitute of Information Engineering, Chinese Academy of Sciences, Beijing, ChinaCyberspace Institute of Advanced Technology (CIAT), Guangzhou University, Guangzhou, Guangdong, ChinaCyberspace Institute of Advanced Technology (CIAT), Guangzhou University, Guangzhou, Guangdong, ChinaWith the rapid development of Internet of Things technology (e.g. wireless sensor networks), security has become a global issue. Confidentiality, integrity, and availability (known as the CIA triangle) is widely used to define and model information security. However, this CIA triangle is insufficient to address rapidly changing security requirements. In this article, we divide information systems into four layers: physical layer, operational layer, data layer, and content layers (PODC). Corresponding, hierarchy of information security is proposed. Furthermore, we define the basic security properties for each layer and show that the four properties (i.e. confidentiality, availability, controllability, and authentication, called CACA) are minimally complete and independent for information security. Based on PODC and CACA, a new definition of information security is proposed, which acts as a secure foundation for information systems.https://doi.org/10.1177/1550147719899374 |
| spellingShingle | Lihua Yin Binxing Fang Yunchuan Guo Zhe Sun Zhihong Tian Hierarchically defining Internet of Things security: From CIA to CACA International Journal of Distributed Sensor Networks |
| title | Hierarchically defining Internet of Things security: From CIA to CACA |
| title_full | Hierarchically defining Internet of Things security: From CIA to CACA |
| title_fullStr | Hierarchically defining Internet of Things security: From CIA to CACA |
| title_full_unstemmed | Hierarchically defining Internet of Things security: From CIA to CACA |
| title_short | Hierarchically defining Internet of Things security: From CIA to CACA |
| title_sort | hierarchically defining internet of things security from cia to caca |
| url | https://doi.org/10.1177/1550147719899374 |
| work_keys_str_mv | AT lihuayin hierarchicallydefininginternetofthingssecurityfromciatocaca AT binxingfang hierarchicallydefininginternetofthingssecurityfromciatocaca AT yunchuanguo hierarchicallydefininginternetofthingssecurityfromciatocaca AT zhesun hierarchicallydefininginternetofthingssecurityfromciatocaca AT zhihongtian hierarchicallydefininginternetofthingssecurityfromciatocaca |