Privacy and Security for Resource-Constrained IoT Devices and Networks: Research Challenges and Opportunities

被引:17
作者
Li, Shancang [1 ]
Song, Houbing [2 ]
Iqbal, Muddesar [3 ]
机构
[1] Univ West England, Dept Comp Sci & Creat Technol, Bristol BS16 1QY, Avon, England
[2] Embry Riddle Aeronaut Univ, Dept Elect Comp Software & Syst Engn, Daytona Beach, FL 32114 USA
[3] London South Bank Univ, Sch Comp, London SE1 0AA, England
关键词
Internet of Things; privacy and security; resource-constrained devices;
D O I
10.3390/s19081935
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
With the exponential growth of the Internet of Things (IoT) and cyber-physical systems (CPS), a wide range of IoT applications have been developed and deployed in recent years. To match the heterogeneous application requirements in IoT and CPS systems, many resource-constrained IoT devices are deployed, in which privacy and security have emerged as difficult challenges because the devices have not been designed to have effective security features.
引用
收藏
页数:4
相关论文
共 16 条
[1]   FPGA Modeling and Optimization of a SIMON Lightweight Block Cipher [J].
Abed, Sa'ed ;
Jaffal, Reem ;
Mohd, Bassam Jamil ;
Alshayeji, Mohammad .
SENSORS, 2019, 19 (04)
[2]   Privacy-Preserving Vehicular Rogue Node Detection Scheme for Fog Computing [J].
Al-Otaibi, Basmah ;
Al-Nabhan, Najla ;
Tian, Yuan .
SENSORS, 2019, 19 (04)
[3]   PPSDT: A Novel Privacy-Preserving Single Decision Tree Algorithm for Clinical Decision-Support Systems Using IoT Devices [J].
Alabdulkarim, Alia ;
Al-Rodhaan, Mznah ;
Ma, Tinghuai ;
Tian, Yuan .
SENSORS, 2019, 19 (01)
[4]   A Randomized Watermarking Technique for Detecting Malicious Data Injection Attacks in Heterogeneous Wireless Sensor Networks for Internet of Things Applications [J].
Alromih, Arwa ;
Al-Rodhaan, Mznah ;
Tian, Yuan .
SENSORS, 2018, 18 (12)
[5]   Energy/Area-Efficient Scalar Multiplication with Binary Edwards Curves for the IoT [J].
Andres Lara-Nino, Carlos ;
Diaz-Perez, Arturo ;
Morales-Sandoval, Miguel .
SENSORS, 2019, 19 (03)
[6]   Exploring Risks Transferred from Cloud-Based Information Systems: A Quantitative and Longitudinal Model [J].
Bouaynaya, Wafa ;
Lyu, Hongbo ;
Zhang, Zuopeng .
SENSORS, 2018, 18 (10)
[7]   Security Cost Aware Data Communication in Low-Power IoT Sensors with Energy Harvesting [J].
Fang, Xiaolin ;
Yang, Ming ;
Wu, Wenjia .
SENSORS, 2018, 18 (12)
[8]   An Incentive Mechanism in Mobile Crowdsourcing Based on Multi-Attribute Reverse Auctions [J].
Hu, Ying ;
Wang, Yingjie ;
Li, Yingshu ;
Tong, Xiangrong .
SENSORS, 2018, 18 (10)
[9]   A Lightweight Cipher Based on Salsa20 for Resource-Constrained IoT Devices [J].
Lara, Evangelina ;
Aguilar, Leocundo ;
Garcia, Jesus A. ;
Sanchez, Mauricio A. .
SENSORS, 2018, 18 (10)
[10]   On the Security and Data Integrity of Low-Cost Sensor Networks for Air Quality Monitoring [J].
Luo, Lan ;
Zhang, Yue ;
Pearson, Bryan ;
Ling, Zhen ;
Yu, Haofei ;
Fu, Xinwen .
SENSORS, 2018, 18 (12)