Security at the Edge for Resource-Limited IoT Devices

被引:11
|
作者
Canavese, Daniele [1 ]
Mannella, Luca [2 ]
Regano, Leonardo [3 ]
Basile, Cataldo [2 ]
机构
[1] CNRS, IRIT, 118 Route Narbonne, F-31062 Toulouse 9, France
[2] Politecn Torino, Dipartimento Automat & Informat, Corso Duca Abruzzi 24, I-10129 Turin, Italy
[3] Univ Cagliari, Dipartimento Ingn Elettr & Elettron, I-09123 Cagliari, Italy
关键词
authentication; cybersecurity; edge computing; Internet of Things (IoT); intrusion prevention system (IPS); machine learning; gateways; oblivious authentication; proxy; virtual private network (VPN); INTRUSION DETECTION; SYSTEM;
D O I
10.3390/s24020590
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The Internet of Things (IoT) is rapidly growing, with an estimated 14.4 billion active endpoints in 2022 and a forecast of approximately 30 billion connected devices by 2027. This proliferation of IoT devices has come with significant security challenges, including intrinsic security vulnerabilities, limited computing power, and the absence of timely security updates. Attacks leveraging such shortcomings could lead to severe consequences, including data breaches and potential disruptions to critical infrastructures. In response to these challenges, this research paper presents the IoT Proxy, a modular component designed to create a more resilient and secure IoT environment, especially in resource-limited scenarios. The core idea behind the IoT Proxy is to externalize security-related aspects of IoT devices by channeling their traffic through a secure network gateway equipped with different Virtual Network Security Functions (VNSFs). Our solution includes a Virtual Private Network (VPN) terminator and an Intrusion Prevention System (IPS) that uses a machine learning-based technique called oblivious authentication to identify connected devices. The IoT Proxy's modular, scalable, and externalized security approach creates a more resilient and secure IoT environment, especially for resource-limited IoT devices. The promising experimental results from laboratory testing demonstrate the suitability of IoT Proxy to secure real-world IoT ecosystems.
引用
收藏
页数:16
相关论文
共 50 条
  • [21] A Generic Framework for Resource-Limited Microcontrollers Deployment in I-IoT Systems
    Abu Naim, Belal
    Ghafourian, Yasin
    Ryabokon, Anna
    Flamigni, Francesca
    Baldrian, Ralph
    PROCEEDINGS OF 2024 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, NOMS 2024, 2024,
  • [22] RcdMathLib: An Open Source Software Library for Computing on Resource-Limited Devices
    Kasmi, Zakaria
    Norrdine, Abdelmoumen
    Schiller, Jochen
    Guenes, Mesut
    Motzko, Christoph
    SENSORS, 2021, 21 (05) : 1 - 23
  • [23] MobileBERT: a Compact Task-Agnostic BERT for Resource-Limited Devices
    Sun, Zhiqing
    Yu, Hongkun
    Song, Xiaodan
    Liu, Renjie
    Yang, Yiming
    Zhou, Denny
    58TH ANNUAL MEETING OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS (ACL 2020), 2020, : 2158 - 2170
  • [24] Bitcoin Payment-Channels for Resource Limited IoT Devices
    Hannon, Christopher
    Jin, Dong
    INTERNATIONAL CONFERENCE ON OMNI-LAYER INTELLIGENT SYSTEMS (COINS), 2019, : 50 - 57
  • [25] Design of Physically Unclonable Function Using Ferroelectric FET With Auto Write-Back Technique for Resource-Limited IoT Security
    Lim, Sehee
    Hwang, Junghyeon
    Ko, Dong Han
    Kim, Se Keon
    Oh, Tae Woo
    Jeon, Sanghun
    Jung, Seong-Ook
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (16): : 27676 - 27686
  • [26] Securing Low-Resource Edge Devices for IoT Systems
    Shapsough, Shams
    Aloul, Fadi
    Zualkernan, Imran A.
    2018 INTERNATIONAL SYMPOSIUM IN SENSING AND INSTRUMENTATION IN IOT ERA (ISSI), 2018,
  • [27] Pharmacovigilance in resource-limited countries
    Olsson, Sten
    Pal, Shanthi N.
    Dodoo, Alex
    EXPERT REVIEW OF CLINICAL PHARMACOLOGY, 2015, 8 (04) : 449 - 460
  • [28] Headache in Resource-Limited Settings
    Yohannes W. Woldeamanuel
    Current Pain and Headache Reports, 2017, 21
  • [29] Resource management of IoT edge devices: Challenges, techniques, and solutions
    Kumar, Neeraj
    Jindal, Anish
    Villari, Massimo
    Srirama, Satish Narayana
    SOFTWARE-PRACTICE & EXPERIENCE, 2021, 51 (12): : 2357 - 2359
  • [30] Biosurveillance in resource-limited environments
    Taitt, Chris
    ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 2017, 254