End-to-end Security in the IoT Computing Continuum: Perspectives in the SWAMP Project

被引:5
|
作者
Kleinschmidt, Joao H. [1 ]
Kamienski, Carlos [1 ]
Prati, Ronaldo C. [1 ]
Kolehmainen, Kari [2 ]
Aguzzi, Cristiano [3 ]
机构
[1] Fed Univ ABC, Santo Andre, SP, Brazil
[2] VTT Tech Res Ctr Finland, Oulu, Finland
[3] Univ Bologna, Bologna, Italy
来源
2019 9TH LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING (LADC) | 2019年
关键词
Internet of Things; Smart Water Management; IoT Computing Continuum; Security;
D O I
10.1109/ladc48089.2019.8995724
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The use of the Internet of Things (IoT) and other related technologies in precision irrigation for agriculture may optimize the use of water, reduce energy consumption, and improve the quality of crops. The SWAMP project is implementing IoT in this domain in four pilots in Europe and Brazil, where heterogeneous devices and distributed components form an IoT Computing Continuum. The security of IoT systems is a challenging task, as these systems present distinctive characteristics when compared to traditional cloud-based systems. Approaches to secure data generated in the sensors until the user's application is a challenging task. This paper discusses how the SWAMP project is dealing with end-to-end security and technologies for the application of IoT in agriculture.
引用
收藏
页码:191 / 192
页数:2
相关论文
共 50 条
  • [21] Security Analysis of End-to-End Encryption for Zoom Meetings
    Isobe, Takanori
    Ito, Ryoma
    IEEE ACCESS, 2021, 9 : 90677 - 90689
  • [22] Developing and Deploying End-to-End Interoperable & Discoverable IoT Applications
    Doukas, Charalampos
    Antonelli, Fabio
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 673 - 678
  • [23] Benefits of end-to-end IP for cyber and physical security
    Seewald, M. G.
    2012 IEEE PES TRANSMISSION AND DISTRIBUTION CONFERENCE AND EXPOSITION (T&D), 2012,
  • [24] End-to-end Security for Sleepy Smart Object Networks
    Sethi, Mohit
    Arkko, Jari
    Keranen, Ari
    PROCEEDINGS OF THE 37TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS WORKSHOPS (LCN 2012), 2012, : 973 - 981
  • [25] An End-to-end Trust Management Framework for Crowdsourced IoT Services
    Bahutair, Mohammed
    Bouguettaya, Athman
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2023, 23 (03)
  • [26] End-to-End Encryption in Resource-Constrained IoT Device
    Alluhaidan, Ala Saleh D.
    Prabu, P.
    IEEE ACCESS, 2023, 11 : 70040 - 70051
  • [27] The Design and Deployment of an End-To-End IoT Infrastructure for the Natural Environment
    Nundloll, Vatsala
    Porter, Barry
    Blair, Gordon S.
    Emmett, Bridget
    Cosby, Jack
    Jones, Davey L.
    Chadwick, Dave
    Winterbourn, Ben
    Beattie, Philip
    Dean, Graham
    Shaw, Rory
    Shelley, Wayne
    Brown, Mike
    Ullah, Izhar
    FUTURE INTERNET, 2019, 11 (06)
  • [28] End-to-End Service Level Agreement Specification for IoT Applications
    Alqahtani, Awatif
    Li, Yinhao
    Patel, Pankesh
    Solaiman, Ellis
    Ranjan, Rajiv
    PROCEEDINGS 2018 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS), 2018, : 926 - 935
  • [29] End-to-End Protection of IoT Communications Through Cryptographic Enforcement of Access Control Policies
    Berlato, Stefano
    Morelli, Umberto
    Carbone, Roberto
    Ranise, Silvio
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXVI, DBSEC 2022, 2022, 13383 : 236 - 255
  • [30] A Robust End-to-End IoT System for Supporting Workers in Mining Industries
    Vlachos, Marios
    Pavlopoulos, Lampros
    Georgakopoulos, Anastasios
    Tsimiklis, Georgios
    Amditis, Angelos
    SENSORS, 2024, 24 (11)