End-to-end Security in the IoT Computing Continuum: Perspectives in the SWAMP Project

被引:5
作者
Kleinschmidt, Joao H. [1 ]
Kamienski, Carlos [1 ]
Prati, Ronaldo C. [1 ]
Kolehmainen, Kari [2 ]
Aguzzi, Cristiano [3 ]
机构
[1] Fed Univ ABC, Santo Andre, SP, Brazil
[2] VTT Tech Res Ctr Finland, Oulu, Finland
[3] Univ Bologna, Bologna, Italy
来源
2019 9TH LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING (LADC) | 2019年
关键词
Internet of Things; Smart Water Management; IoT Computing Continuum; Security;
D O I
10.1109/ladc48089.2019.8995724
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The use of the Internet of Things (IoT) and other related technologies in precision irrigation for agriculture may optimize the use of water, reduce energy consumption, and improve the quality of crops. The SWAMP project is implementing IoT in this domain in four pilots in Europe and Brazil, where heterogeneous devices and distributed components form an IoT Computing Continuum. The security of IoT systems is a challenging task, as these systems present distinctive characteristics when compared to traditional cloud-based systems. Approaches to secure data generated in the sensors until the user's application is a challenging task. This paper discusses how the SWAMP project is dealing with end-to-end security and technologies for the application of IoT in agriculture.
引用
收藏
页码:191 / 192
页数:2
相关论文
共 50 条
  • [31] Improve End-to-End Security using S-aePAKE
    Parmar, Hiren
    Gosai, Atul
    PROCEEDINGS OF THE 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2019, : 333 - 338
  • [32] Parallel End-to-End Autonomous Mining: An IoT-Oriented Approach
    Gao, Yu
    Ai, Yunfeng
    Tian, Bin
    Chen, Long
    Wang, Jian
    Cao, Dongpu
    Wang, Fei-Yue
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (02): : 1011 - 1023
  • [33] A Robust End-to-End IoT System for Supporting Workers in Mining Industries
    Vlachos, Marios
    Pavlopoulos, Lampros
    Georgakopoulos, Anastasios
    Tsimiklis, Georgios
    Amditis, Angelos
    SENSORS, 2024, 24 (11)
  • [34] End-to-End Automated Exploit Generation for Processor Security Validation
    Zhang, Rui
    Deutschbein, Calvin
    Huang, Peng
    Sturton, Cynthia
    IEEE DESIGN & TEST, 2021, 38 (03) : 22 - 30
  • [35] ANALYSIS OF END-TO-END SOA SECURITY PROTOCOLS WITH MOBILE DEVICES
    Ahmed, Norman
    Gamble, Rose
    Linderman, Mark
    Bhargava, Bharat
    2013 IEEE 14TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT (MDM 2013), VOL 2, 2013, : 166 - 170
  • [36] Performance Evaluation of end-to-end security protocols in an Internet of Things
    De Rubertis, Antonio
    Mainetti, Luca
    Mighali, Vincenzo
    Patrono, Luigi
    Sergi, Ilaria
    Stefanizzi, Maria Laura
    Pascali, Stefano
    2013 21ST INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM 2013), 2013, : 94 - 99
  • [37] Niflheim - End-to-End Middleware for Applications Across all Tiers of the IoT
    Akkermans, Sven
    Small, Nicolas
    Joosen, Wouter
    Hughes, Danny
    PROCEEDINGS OF THE 15TH ACM CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS (SENSYS'17), 2017,
  • [38] Measuring End-to-End Delay in Low Energy SDN IoT Platform
    Beshley, Mykola
    Kryvinska, Natalia
    Beshley, Halyna
    Kochan, Orest
    Barolli, Leonard
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (01): : 19 - 41
  • [39] An End-to-End Security Aware WSN Approach with Localization & Authentication and Data Exchange Security
    Priyanka, R.
    Reddy, K. Satyanarayan
    INTERNATIONAL TRANSACTION JOURNAL OF ENGINEERING MANAGEMENT & APPLIED SCIENCES & TECHNOLOGIES, 2022, 13 (07):
  • [40] End-to-end slices to orchestrate resources and services in the cloud-to-edge continuum
    Tusa, Francesco
    Clayman, Stuart
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 141 : 473 - 488