Secure Communications for Resource-Constrained IoT Devices†

被引:3
作者
Taha, Abd-Elhamid M. [1 ]
Rashwan, Abdulmonem M. [2 ]
Hassanein, Hossam S. [2 ]
机构
[1] Alfaisal Univ, Elect Engn Dept, POB 50927, Riyadh 11533, Saudi Arabia
[2] Queens Univ, Sch Comp, Kingston, ON K7L 2N6, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
IoT Security; resource-aiding; resource-lending; mobile computing security; next-generation Internet security; SOFTWARE-DEFINED NETWORKS; INTERNET; FRAMEWORK; THREATS; THINGS; FOG;
D O I
10.3390/s20133637
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The importance of securing communications on the Internet of Things (IoT) cannot be overstated. This is especially the case in light of the increasing proliferation of IoT devices and instances, as well as the growing dependence on their usage. Meanwhile, there have recently been mounting concerns over a wide array of vulnerabilities in IoT communications. The objective of this work is to address constraints in IoT devices that are "resource-constrained", which are devices that are limited in terms of computing, energy, communication, or range capabilities, whether in terms of nominal or temporal limitations. Specifically, we propose a framework for resource-aiding constrained devices to facilitate secure communication. Without loss of generalization, the framework's viability is illustrated by focusing on a group of security functions that utilize message authentication codes, which is a strongly representative example of resource-intensive security functions. Aspects of the framework are further demonstrated in processing cores commonly used in commercial IoT devices.
引用
收藏
页码:1 / 18
页数:18
相关论文
共 38 条
[1]  
Akamai, 2019, STAT INT SEC YEAR RE, P3
[2]   Token-Based Security for the Internet of Things With Dynamic Energy-Quality Tradeoff [J].
Aman, Muhammad Naveed ;
Taneja, Sachin ;
Sikdar, Biplab ;
Chua, Kee Chaing ;
Alioto, Massimo .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) :2843-2859
[3]  
[Anonymous], 2007, 4919 RFC IETF
[4]  
[Anonymous], 2015, P 14 ACM WORKSH HOT
[5]  
[Anonymous], 2016, 7933 RFC IETF
[6]  
[Anonymous], 2014, RFC 7252-The constrained application
[7]  
[Anonymous], 2015, 7540 IETF RFC
[8]  
Blanc G., 2018, P 13 INT C AV REL SE
[9]   Design and analysis of authenticated key agreement scheme in cloud-assisted cyber-physical systems [J].
Challa, Sravani ;
Das, Ashok Kumar ;
Gope, Prosanta ;
Kumar, Neeraj ;
Wu, Fan ;
Vasilakos, Athanasios V. .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 108 :1267-1286
[10]   Advancing Software-Defined Networks: A Survey [J].
Cox, Jacob, Jr. ;
Chuang, Joaquin ;
Donvan, Sean ;
Ivey, Jared ;
Clarx, Russel J. ;
Riley, George ;
Owen, Henry L., III .
IEEE ACCESS, 2017, 5 :25487-25526