Security at the Edge for Resource-Limited IoT Devices

被引:11
|
作者
Canavese, Daniele [1 ]
Mannella, Luca [2 ]
Regano, Leonardo [3 ]
Basile, Cataldo [2 ]
机构
[1] CNRS, IRIT, 118 Route Narbonne, F-31062 Toulouse 9, France
[2] Politecn Torino, Dipartimento Automat & Informat, Corso Duca Abruzzi 24, I-10129 Turin, Italy
[3] Univ Cagliari, Dipartimento Ingn Elettr & Elettron, I-09123 Cagliari, Italy
关键词
authentication; cybersecurity; edge computing; Internet of Things (IoT); intrusion prevention system (IPS); machine learning; gateways; oblivious authentication; proxy; virtual private network (VPN); INTRUSION DETECTION; SYSTEM;
D O I
10.3390/s24020590
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The Internet of Things (IoT) is rapidly growing, with an estimated 14.4 billion active endpoints in 2022 and a forecast of approximately 30 billion connected devices by 2027. This proliferation of IoT devices has come with significant security challenges, including intrinsic security vulnerabilities, limited computing power, and the absence of timely security updates. Attacks leveraging such shortcomings could lead to severe consequences, including data breaches and potential disruptions to critical infrastructures. In response to these challenges, this research paper presents the IoT Proxy, a modular component designed to create a more resilient and secure IoT environment, especially in resource-limited scenarios. The core idea behind the IoT Proxy is to externalize security-related aspects of IoT devices by channeling their traffic through a secure network gateway equipped with different Virtual Network Security Functions (VNSFs). Our solution includes a Virtual Private Network (VPN) terminator and an Intrusion Prevention System (IPS) that uses a machine learning-based technique called oblivious authentication to identify connected devices. The IoT Proxy's modular, scalable, and externalized security approach creates a more resilient and secure IoT environment, especially for resource-limited IoT devices. The promising experimental results from laboratory testing demonstrate the suitability of IoT Proxy to secure real-world IoT ecosystems.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] Edge-Assisted Real-Time Instance Segmentation for Resource-Limited IoT Devices
    Xie, Yuanyan
    Guo, Yu
    Mi, Zhenqiang
    Yang, Yang
    Obaidat, Mohammad S.
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (01) : 473 - 485
  • [2] Compact modular multiplier design for strong security capabilities in resource-limited Telehealth IoT devices
    Ibrahim, Atef
    Gebali, Fayez
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (09) : 6847 - 6854
  • [3] Efficient Deep Structure Learning for Resource-Limited IoT Devices
    Shen, Shibo
    Li, Rongpeng
    Zhao, Zhifeng
    Liu, Qing
    Liang, Jing
    Zhang, Honggang
    2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [4] Security Architecture for Resource-Limited Environments
    Nair, S.
    Abraham, S.
    Al Ibrahim, O.
    2011 7TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2011, : 412 - 417
  • [5] Security management for ad-hoc networked resource-limited mobile devices
    Sedov, I
    Speicher, S
    Cap, C
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 3262 - 3266
  • [6] Online VNF chain deployment on resource-limited edges by exploiting peer edge devices
    Xie, An
    Huang, Huawei
    Wang, Xiaoliang
    Qian, Zhuzhong
    Lu, Sanglu
    COMPUTER NETWORKS, 2020, 170
  • [7] A Sequential Approach to Detect Drifts and Retrain Neural Networks on Resource-Limited Edge Devices
    Sunaga, Kazuki
    Yamada, Takeya
    Matsutani, Hiroki
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2024, E107 (06) : 741 - 750
  • [8] Variable Length Quantization based Design of Polar Codes Decoder for Resource-Limited IoT Devices
    Hassan, Arslan
    Pasha, Muhammad Adeel
    Uppal, Momin
    2022 29TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS (IEEE ICECS 2022), 2022,
  • [9] A Lightweight Concept Drift Detection Method for On-Device Learning on Resource-Limited Edge Devices
    Yamada, Takeya
    Matsutani, Hiroki
    2023 IEEE INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS, IPDPSW, 2023, : 761 - 768
  • [10] Security for Heterogeneous and Ubiquitous Environments Consisting of Resource-Limited Devices: An Approach to Authorization Using Kerberos
    Astorga, Jasone
    Matias, Jon
    Saiz, Purificacion
    Jacob, Eduardo
    SECURITY IN EMERGING WIRELESS COMMUNICATION AND NETWORKING SYSTEMS, 2010, 42 : 65 - 76