Secure Communications for Resource-Constrained IoT Devices†

被引:3
作者
Taha, Abd-Elhamid M. [1 ]
Rashwan, Abdulmonem M. [2 ]
Hassanein, Hossam S. [2 ]
机构
[1] Alfaisal Univ, Elect Engn Dept, POB 50927, Riyadh 11533, Saudi Arabia
[2] Queens Univ, Sch Comp, Kingston, ON K7L 2N6, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
IoT Security; resource-aiding; resource-lending; mobile computing security; next-generation Internet security; SOFTWARE-DEFINED NETWORKS; INTERNET; FRAMEWORK; THREATS; THINGS; FOG;
D O I
10.3390/s20133637
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The importance of securing communications on the Internet of Things (IoT) cannot be overstated. This is especially the case in light of the increasing proliferation of IoT devices and instances, as well as the growing dependence on their usage. Meanwhile, there have recently been mounting concerns over a wide array of vulnerabilities in IoT communications. The objective of this work is to address constraints in IoT devices that are "resource-constrained", which are devices that are limited in terms of computing, energy, communication, or range capabilities, whether in terms of nominal or temporal limitations. Specifically, we propose a framework for resource-aiding constrained devices to facilitate secure communication. Without loss of generalization, the framework's viability is illustrated by focusing on a group of security functions that utilize message authentication codes, which is a strongly representative example of resource-intensive security functions. Aspects of the framework are further demonstrated in processing cores commonly used in commercial IoT devices.
引用
收藏
页码:1 / 18
页数:18
相关论文
共 38 条
[11]   A Survey of Mobile Information-Centric Networking: Research Issues and Challenges [J].
Fang, Chao ;
Yao, Haipeng ;
Wang, Zhuwei ;
Wu, Wenjun ;
Jin, Xiaoning ;
Yu, F. Richard .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (03) :2353-2371
[12]   Mediated reality using computer graphics hardware for computer vision [J].
Fung, J ;
Tang, F ;
Mann, S .
SIXTH INTERNATIONAL SYMPOSIUM ON WEARABLE COMPUTERS, PROCEEDINGS, 2002, :83-89
[13]   Dynamic Analysis of Application Delivery Network for Leveraging Software Defined Infrastructures [J].
Gupta, Lav ;
Jain, Raj ;
Samaka, Mohammed .
2015 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2015), 2015, :305-310
[14]   Realizing an Internet of Secure Things: A Survey on Issues and Enabling Technologies [J].
Hamad, Salma Abdalla ;
Sheng, Quan Z. ;
Zhang, Wei Emma ;
Nepal, Surya .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (02) :1372-1391
[15]   An adaptive cryptographic accelerator for IPsec on dynamically reconfigurable processor [J].
Hasegawa, Y ;
Abe, S ;
Matsutani, H ;
Amano, H ;
Anjo, K ;
Awashima, T .
FPT 05: 2005 IEEE INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE TECHNOLOGY, PROCEEDINGS, 2005, :163-170
[16]   A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures [J].
Hassija, Vikas ;
Chamola, Vinay ;
Saxena, Vikas ;
Jain, Divyansh ;
Goyal, Pranav ;
Sikdar, Biplab .
IEEE ACCESS, 2019, 7 :82721-82743
[17]   Security of the Internet of Things: perspectives and challenges [J].
Jing, Qi ;
Vasilakos, Athanasios V. ;
Wan, Jiafu ;
Lu, Jingwei ;
Qiu, Dechao .
WIRELESS NETWORKS, 2014, 20 (08) :2481-2501
[18]  
Juvekar A., 2018, THESIS
[19]   Agent-based broadcast protocols for wireless heterogeneous node networks [J].
Lakhlef, Hicham ;
Bouabdallah, Abdelmadjid ;
Raynal, Michel ;
Bourgeois, Julien .
COMPUTER COMMUNICATIONS, 2018, 115 :51-63
[20]  
Law YW, 2006, ACM T SENSOR NETWORK, V2