Security at the Edge for Resource-Limited IoT Devices

被引:12
作者
Canavese, Daniele [1 ]
Mannella, Luca [2 ]
Regano, Leonardo [3 ]
Basile, Cataldo [2 ]
机构
[1] CNRS, IRIT, 118 Route Narbonne, F-31062 Toulouse 9, France
[2] Politecn Torino, Dipartimento Automat & Informat, Corso Duca Abruzzi 24, I-10129 Turin, Italy
[3] Univ Cagliari, Dipartimento Ingn Elettr & Elettron, I-09123 Cagliari, Italy
关键词
authentication; cybersecurity; edge computing; Internet of Things (IoT); intrusion prevention system (IPS); machine learning; gateways; oblivious authentication; proxy; virtual private network (VPN); INTRUSION DETECTION; SYSTEM;
D O I
10.3390/s24020590
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The Internet of Things (IoT) is rapidly growing, with an estimated 14.4 billion active endpoints in 2022 and a forecast of approximately 30 billion connected devices by 2027. This proliferation of IoT devices has come with significant security challenges, including intrinsic security vulnerabilities, limited computing power, and the absence of timely security updates. Attacks leveraging such shortcomings could lead to severe consequences, including data breaches and potential disruptions to critical infrastructures. In response to these challenges, this research paper presents the IoT Proxy, a modular component designed to create a more resilient and secure IoT environment, especially in resource-limited scenarios. The core idea behind the IoT Proxy is to externalize security-related aspects of IoT devices by channeling their traffic through a secure network gateway equipped with different Virtual Network Security Functions (VNSFs). Our solution includes a Virtual Private Network (VPN) terminator and an Intrusion Prevention System (IPS) that uses a machine learning-based technique called oblivious authentication to identify connected devices. The IoT Proxy's modular, scalable, and externalized security approach creates a more resilient and secure IoT environment, especially for resource-limited IoT devices. The promising experimental results from laboratory testing demonstrate the suitability of IoT Proxy to secure real-world IoT ecosystems.
引用
收藏
页数:16
相关论文
共 50 条
  • [31] CAAVI-RICS model for observing the security of distributed IoT and edge computing systems
    Pesic, Sasa
    Ivanovic, Mirjana
    Radovanovic, Milos
    Badica, Costin
    SIMULATION MODELLING PRACTICE AND THEORY, 2020, 105
  • [32] AIS Meets IoT: A Network Security Mechanism of Sustainable Marine Resource Based on Edge Computing
    Chao, Han-Chieh
    Wu, Hsin-Te
    Tseng, Fan-Hsun
    SUSTAINABILITY, 2021, 13 (06)
  • [33] Novel Attacks and Novel Efficient Three-Party Authenticated Key Agreement Schemes for Resource-limited Devices
    Chien, Hung-Yu
    JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (07): : 2177 - 2188
  • [34] Adaptive federated learning for resource-constrained IoT devices through edge intelligence and multi-edge clustering
    Mughal, Fahad Razaque
    He, Jingsha
    Das, Bhagwan
    Dharejo, Fayaz Ali
    Zhu, Nafei
    Khan, Surbhi Bhatia
    Alzahrani, Saeed
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [35] A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures
    Hassija, Vikas
    Chamola, Vinay
    Saxena, Vikas
    Jain, Divyansh
    Goyal, Pranav
    Sikdar, Biplab
    IEEE ACCESS, 2019, 7 : 82721 - 82743
  • [36] Theoretical Analysis on Edge Computation Offloading Policies for IoT Devices
    Zhang, Yuming
    Feng, Bohao
    Quan, Wei
    Li, Guanglei
    Zhou, Huachun
    Zhang, Hongke
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03): : 4228 - 4241
  • [37] Lightweight Security Mechanism over MQTT Protocol for IoT Devices
    Amnalou, Sanaz
    Abu Bakar, Khairul Azmi
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (07) : 202 - 207
  • [38] Toward Improving the Security of IoT and CPS Devices: An AI Approach
    Albasir, Abdurhman
    Naik, Kshirasagar
    Manzano, Ricardo
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2023, 4 (02):
  • [39] Distributed multi-party security computation framework for heterogeneous internet of things (IoT) devices
    Al-Otaibi, Yasser D.
    SOFT COMPUTING, 2021, 25 (18) : 12131 - 12144
  • [40] IoT security issues in the context of Edge Computing: A Systematic Review of Literature
    Torres-Carrion, Hernan
    Solano-Chamba, Cecivel
    Narvaez-Guillen, Cristian
    Cueva-Hurtado, Mario
    2022 17TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2022,