Security at the Edge for Resource-Limited IoT Devices

被引:12
作者
Canavese, Daniele [1 ]
Mannella, Luca [2 ]
Regano, Leonardo [3 ]
Basile, Cataldo [2 ]
机构
[1] CNRS, IRIT, 118 Route Narbonne, F-31062 Toulouse 9, France
[2] Politecn Torino, Dipartimento Automat & Informat, Corso Duca Abruzzi 24, I-10129 Turin, Italy
[3] Univ Cagliari, Dipartimento Ingn Elettr & Elettron, I-09123 Cagliari, Italy
关键词
authentication; cybersecurity; edge computing; Internet of Things (IoT); intrusion prevention system (IPS); machine learning; gateways; oblivious authentication; proxy; virtual private network (VPN); INTRUSION DETECTION; SYSTEM;
D O I
10.3390/s24020590
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The Internet of Things (IoT) is rapidly growing, with an estimated 14.4 billion active endpoints in 2022 and a forecast of approximately 30 billion connected devices by 2027. This proliferation of IoT devices has come with significant security challenges, including intrinsic security vulnerabilities, limited computing power, and the absence of timely security updates. Attacks leveraging such shortcomings could lead to severe consequences, including data breaches and potential disruptions to critical infrastructures. In response to these challenges, this research paper presents the IoT Proxy, a modular component designed to create a more resilient and secure IoT environment, especially in resource-limited scenarios. The core idea behind the IoT Proxy is to externalize security-related aspects of IoT devices by channeling their traffic through a secure network gateway equipped with different Virtual Network Security Functions (VNSFs). Our solution includes a Virtual Private Network (VPN) terminator and an Intrusion Prevention System (IPS) that uses a machine learning-based technique called oblivious authentication to identify connected devices. The IoT Proxy's modular, scalable, and externalized security approach creates a more resilient and secure IoT environment, especially for resource-limited IoT devices. The promising experimental results from laboratory testing demonstrate the suitability of IoT Proxy to secure real-world IoT ecosystems.
引用
收藏
页数:16
相关论文
共 50 条
  • [41] A Capability for Autonomous IoT System Security: Pushing IoT Assurance to the Edge
    Chavis, Jeffrey S.
    Buczak, Anna
    Kunz, Aaron
    Rubin, Aviel
    Watkins, Lanier
    2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2020), 2020, : 256 - 261
  • [42] STEC-IoT: A Security Tactic by Virtualizing Edge Computing on IoT
    Zhang, Peiying
    Jiang, Chunxiao
    Pang, Xue
    Qian, Yi
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (04) : 2459 - 2467
  • [43] MR-Edge: a MapReduce-based Protocol for IoT Edge Computing with Resource Constraints
    Wang, Qian
    Lee, Brian
    Murray, Niall
    Qiao, Yuansong
    2019 16TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2019,
  • [44] Machine Learning for Edge-Aware Resource Orchestration for IoT Applications
    Jammal, Manar
    AbuSharkh, Mohamed
    2021 IEEE GLOBAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INTERNET OF THINGS (GCAIOT), 2021, : 37 - 44
  • [45] A Lightweight Leakage-Resilient Identity-Based Mutual Authentication and Key Exchange Protocol for Resource-limited Devices
    Tseng, Yuh-Min
    Chen, Jian-Lun
    Huang, Sen-Shan
    COMPUTER NETWORKS, 2021, 196
  • [46] Security in product lifecycle of IoT devices: A survey
    Yousefnezhad, Narges
    Malhi, Avleen
    Framling, Kary
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 171
  • [47] Design, Implementation, and Practical Evaluation of a Voice Recognition Based IoT Home Automation System for Low-Resource Languages and Resource-Constrained Edge IoT Devices: A System for Galician and Mobile Opportunistic Scenarios
    Froiz-Miguez, Ivan
    Fraga-Lamas, Paula
    Fernandez-Carames, Tiago M.
    IEEE ACCESS, 2023, 11 : 63623 - 63649
  • [48] Evaluating the Security of IoT Networks with Mobile Devices
    Samandari, Amelia
    Ge, Mengmeng
    Hong, Jin B.
    Kim, Dong Seong
    2018 IEEE 23RD PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2018, : 171 - 180
  • [49] Efficient Certificateless Online/Offline Signcryption Scheme for Edge IoT Devices
    Chen, Jiasheng
    Wang, Liangliang
    Wen, Mi
    Zhang, Kai
    Chen, Kefei
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (11) : 8967 - 8979
  • [50] CrossNet: A Low-Latency MLaaS Framework for Privacy-Preserving Neural Network Inference on Resource-Limited Devices
    Lin, Yu
    Zhang, Tianling
    Mao, Yunlong
    Zhong, Sheng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (02) : 1265 - 1280