End-to-end Security in the IoT Computing Continuum: Perspectives in the SWAMP Project

被引:5
作者
Kleinschmidt, Joao H. [1 ]
Kamienski, Carlos [1 ]
Prati, Ronaldo C. [1 ]
Kolehmainen, Kari [2 ]
Aguzzi, Cristiano [3 ]
机构
[1] Fed Univ ABC, Santo Andre, SP, Brazil
[2] VTT Tech Res Ctr Finland, Oulu, Finland
[3] Univ Bologna, Bologna, Italy
来源
2019 9TH LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING (LADC) | 2019年
关键词
Internet of Things; Smart Water Management; IoT Computing Continuum; Security;
D O I
10.1109/ladc48089.2019.8995724
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The use of the Internet of Things (IoT) and other related technologies in precision irrigation for agriculture may optimize the use of water, reduce energy consumption, and improve the quality of crops. The SWAMP project is implementing IoT in this domain in four pilots in Europe and Brazil, where heterogeneous devices and distributed components form an IoT Computing Continuum. The security of IoT systems is a challenging task, as these systems present distinctive characteristics when compared to traditional cloud-based systems. Approaches to secure data generated in the sensors until the user's application is a challenging task. This paper discusses how the SWAMP project is dealing with end-to-end security and technologies for the application of IoT in agriculture.
引用
收藏
页码:191 / 192
页数:2
相关论文
共 50 条
  • [41] A Dynamic Identity End-to-End Authentication Key Exchange Protocol for IoT Environments
    Hsu, Chien-Lung
    Chuang, Tzu-Hsien
    Chen, Yu-Han
    Lin, Tzu-Wei
    Lu, Huang-Chia
    2017 TWELFTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT (ICDIM), 2017, : 133 - 138
  • [42] REEDS: An Efficient Revocable End-to-End Encrypted Message Distribution System for IoT
    Li, Cui
    Chen, Rongmao
    Wang, Yi
    Xing, Qianqian
    Wang, Baosheng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (05) : 4526 - 4542
  • [43] Type-preserving Compilation for End-to-end Verification of Security Enforcement
    Chen, Juan
    Chugh, Ravi
    Swamy, Nikhil
    ACM SIGPLAN NOTICES, 2010, 45 (06) : 412 - 423
  • [44] A Triggering Mechanism for End-to-end IoT eHealth System with Connected Ambulance Vehicles
    Elsaadany, Amr
    Sedky, Amr
    Elkholy, Noor
    2017 8TH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS & APPLICATIONS (IISA), 2017, : 126 - 131
  • [45] CaSA: End-to-End Quantitative Security Analysis of Randomly Mapped Caches
    Bourgeat, Thomas
    Drean, Jules
    Yang, Yuheng
    Tsai, Lillian
    Emer, Joel S.
    Yan, Mengjia
    IEEE DESIGN & TEST, 2025, 42 (01) : 5 - 12
  • [46] End-to-End Transport Security in the IP-based Internet of Things
    Brachmann, Martina
    Keoh, Sye Loong
    Morchon, Oscar Garcia
    Kumar, Sandeep S.
    2012 21ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2012,
  • [47] End-to-end security scheme for mobility enabled healthcare Internet of Things
    Moosavi, Sanaz Rahimi
    Tuan Nguyen Gia
    Nigussie, Ethiopia
    Rahmani, Amir M.
    Virtanen, Seppo
    Tenhunen, Hannu
    Isoaho, Jouni
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 64 : 108 - 124
  • [48] An End-to-End Smart IoT-Driven Navigation for Social Distancing Enforcement
    Friji, Hamdi
    Khanfor, Abdullah
    Ghazzai, Hakim
    Massoud, Yehia
    IEEE ACCESS, 2022, 10 : 76824 - 76841
  • [49] On the Security of End-to-End Measurements Based on Packet-Pair Dispersions
    Karame, Ghassan O.
    Danev, Boris
    Bannwart, Cyrill
    Capkun, Srdjan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (01) : 149 - 162
  • [50] On the effectiveness of end-to-end security for Internet-integrated sensing applications
    Granjal, Jorge
    Monteiro, Edmundo
    Silva, Jorge Sa
    2012 IEEE INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND COMMUNICATIONS, CONFERENCE ON INTERNET OF THINGS, AND CONFERENCE ON CYBER, PHYSICAL AND SOCIAL COMPUTING (GREENCOM 2012), 2012, : 87 - 93