Energy-Aware Security Adaptation for Low-Power IoT Applications

被引:0
作者
Rosendo, Miguel [1 ]
Granjal, Jorge [1 ]
机构
[1] Univ Coimbra, Ctr Informat & Syst, P-3030290 Coimbra, Portugal
来源
NETWORK | 2022年 / 2卷 / 01期
关键词
IoT; LoRaWAN; LPWAN; end-to-end security; energy and security; dynamic security adaptation;
D O I
10.3390/network2010003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The constant evolution in communication infrastructures will enable new Internet of Things (IoT) applications, particularly in areas that, up to today, have been mostly enabled by closed or proprietary technologies. Such applications will be enabled by a myriad of wireless communication technologies designed for all types of IoT devices, among which are the Long-Range Wide-Area Network (LoRaWAN) or other Low-power and Wide-Area Networks (LPWAN) communication technologies. This applies to many critical environments, such as industrial control and healthcare, where wireless communications are yet to be broadly adopted. Two fundamental requirements to effectively support upcoming critical IoT applications are those of energy management and security. We may note that those are, in fact, contradictory goals. On the one hand, many IoT devices depend on the usage of batteries while, on the other hand, adequate security mechanisms need to be in place to protect devices and communications from threats against their stability and security. With thismotivation in mind, we propose a solution to address the management, in tandem, of security and energy in LoRaWAN IoT communication environments. We propose and evaluate an architecture in the context of which adaptation logic is used to manage security and energy dynamically, with the goal of guaranteeing appropriate security, while promoting the lifetime of constrained sensing devices. The proposed solution was implemented and experimentally evaluated and was observed to successfully manage security and energy. Security and energy are managed in line with the requirements of the application at hand, the characteristics of the constrained sensing devices employed and the detection, as well as the threat, of particular types of attacks.
引用
收藏
页码:36 / 52
页数:17
相关论文
共 19 条
  • [1] Alliance L., 2015, A technical overview of LoRa and LoRaWAN
  • [2] Banerjee U, 2017, Energy-Efficient Protocols and Hardware Architectures for Transport Layer Security
  • [3] Energy Consumption Model for Sensor Nodes Based on LoRa and LoRaWAN
    Bouguera, Taoufik
    Diouris, Jean-Francois
    Chaillout, Jean-Jacques
    Jaouadi, Randa
    Andrieux, Guillaume
    [J]. SENSORS, 2018, 18 (07)
  • [4] LPWAN Technologies: Emerging Application Characteristics, Requirements, and Design Considerations
    Chaudhari, Bharat S.
    Zennaro, Marco
    Borkar, Suresh
    [J]. FUTURE INTERNET, 2020, 12 (03):
  • [5] Danish SM, 2018, IEEE ICC
  • [6] Formal security analysis of LoRaWAN
    Eldefrawy, Mohamed
    Butun, Ismail
    Pereira, Nuno
    Gidlund, Mikael
    [J]. COMPUTER NETWORKS, 2019, 148 : 328 - 339
  • [7] Energy-efficient mechanisms in security of the internet of things: A survey
    Hellaoui, Hamed
    Koudil, Mouloud
    Bouabdallah, Abdelmadjid
    [J]. COMPUTER NETWORKS, 2017, 127 : 173 - 189
  • [8] A Dual Key-Based Activation Scheme for Secure LoRaWAN
    Kim, Jaehyu
    Song, JooSeok
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2017,
  • [9] Using Blockchain Technology to Build Trust in Sharing LoRaWAN IoT
    Lin, Jun
    Shen, Zhiqi
    Miao, Chunyan
    [J]. PROCEEDINGS OF 2017 2ND INTERNATIONAL CONFERENCE ON CROWD SCIENCE AND ENGINEERING ICCSE 2017, 2017, : 38 - 43
  • [10] Mikhaylov K., 2012, Embedded Systems-Theory and Design Methodology, P407