A context-aware encryption protocol suite for edge computing-based IoT devices

被引:15
作者
Dar, Zaineb [1 ]
Ahmad, Adnan [1 ,2 ]
Khan, Farrukh Aslam [3 ]
Zeshan, Furkh [1 ]
Iqbal, Razi [4 ]
Sherazi, Hafiz Husnain Raza [5 ]
Bashir, Ali Kashif [6 ]
机构
[1] COMSATS Univ Islamabad, Lahore Campus, Islamabad, Pakistan
[2] St Louis Univ, Madrid, Spain
[3] King Saud Univ, CoEIA, Riyadh, Saudi Arabia
[4] Amer Univ Emirates, Dubai, U Arab Emirates
[5] Politecn Bari, Dept Elect & Informat Engn, Bari, Italy
[6] Manchester Metropolitan Univ, Dept Comp & Math, Manchester, Lancs, England
关键词
Edge computing; Cyber physical systems; 6LoWPAN; Context-awareness; Device specification; Information profiling; IoT; SECURITY; INTERNET; ARCHITECTURE; WEB;
D O I
10.1007/s11227-019-03021-2
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Heterogeneous devices are connected with each other through wireless links within a cyber physical system. These devices undergo resource constraints such as battery, bandwidth, memory and computing power. Moreover, the massive interconnections of these devices result in network latency and reduced speed. Edge computing offers a solution to this problem in which devices transmit the preprocessed actionable data in a formal way, resulting in reduced data traffic and improved speed. However, to provide the same level of security to each piece of information is not feasible due to limited resources. In addition, not all the data generated by Internet of things devices require a high level of security. Context-awareness principles can be employed to select an optimal algorithm based on device specifications and required information confidentiality level. For context-awareness, it is essential to consider the dynamic requirements of data confidentiality as well as device available resources. This paper presents a context-aware encryption protocol suite that selects optimal encryption algorithm according to device specifications and the level of data confidentiality. The results presented herein clearly exhibit that the devices were able to save 79% memory consumption, 56% battery consumption and 68% execution time by employing the proposed context-aware encryption protocol suite.
引用
收藏
页码:2548 / 2567
页数:20
相关论文
共 56 条
[31]  
Matthias C, 2015, IEEE CONF COMM NETW, P577, DOI 10.1109/CNS.2015.7346871
[32]   An Overview of Privacy and Security Issues in the Internet of Things [J].
Medaglia, Carlo Maria ;
Serbanati, Alexandru .
INTERNET OF THINGS-BOOK, 2010, :389-395
[33]   Towards a distributed platform for resource-constrained devices [J].
Messer, A ;
Greenberg, I ;
Bernadat, P ;
Milojicic, D ;
Chen, DQ ;
Giuli, TJ ;
Gu, XH .
22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2002, :43-51
[34]  
Mohammadian M., 2009, INT J ELECT FINANCE, V3, P374
[35]   A Survey on Resource Management in loT Operating Systems [J].
Musaddiq, Arslan ;
Bin Zikria, Yousaf ;
Hahm, Oliver ;
Yu, Heejung ;
Bashir, Ali Kashif ;
Kim, Sung Won .
IEEE ACCESS, 2018, 6 :8459-8482
[36]  
Nie T., 2010, Performance evaluation of DES and Blowfish algorithms, P1
[37]   A knowledge-based resource discovery for Internet of Things [J].
Perera, Charith ;
Vasilakos, Athanasios V. .
KNOWLEDGE-BASED SYSTEMS, 2016, 109 :122-136
[38]   Context Aware Computing for The Internet of Things: A Survey [J].
Perera, Charith ;
Zaslavsky, Arkady ;
Christen, Peter ;
Georgakopoulos, Dimitrios .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :414-454
[39]  
Prasad SGR, 2016, 2016 3RD INTERNATIONAL SYMPOSIUM ON WIRELESS SYSTEMS WITHIN THE CONFERENCES ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS (IDAACS-SWS), P15, DOI 10.1109/IDAACS-SWS.2016.7805777
[40]  
Preist C, 2005, LECT NOTES COMPUT SC, V3729, P987, DOI 10.1007/11574620_70