scispace - formally typeset
Open AccessJournal Article

A Distributed Security Mechanism for Resource-Constrained IoT Devices

TLDR
The real-time experimental evaluations have proven the applicability of the proposed mechanism pertaining to the security assurance and the consumed resources of the target IoT devices.
Abstract
Internet of Things (IoT) devices have grown up to comprise embedded systems and sensors with the ability to connect, collect, and transmit data over the Internet. Although, solutions to secure IoT systems exist, Class-0 IoT devices with insufficient resources to support such solutions are considered too resource constrained for a secure communication. This paper provides a distributed security mechanism that targets Class-0 IoT devices. The research goal is to secure the entire data path in two segments; device-to-gateway and gateway-to-server data communications. The main concern in the provided solution is that lighter security operations with minimal resource requirements are performed in the device, while heavier tasks are performed in the gateway side. The proposed mechanism utilizes a symmetric encryption for data objects combined with the native wireless security to offer a layered security mechanism between the device and the gateway. In the offered solution, the IoT gateways provide additional protection by securing data using Transport Layer Security (TLS). The real-time experimental evaluations have proven the applicability of the proposed mechanism pertaining to the security assurance and the consumed resources of the target IoT devices.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal Article

Advanced Encryption Standard (AES).

TL;DR: Der DES basiert auf einer von Horst Feistel bei IBM entwickelten Blockchiffre („Lucipher“) with einer Schlüssellänge von 128 bit zum Sicherheitsrisiko, und zuletzt konnte 1998 mit einem von der „Electronic Frontier Foundation“ (EFF) entwickkelten Spezialmaschine mit 1.800 parallel arbeit
Journal ArticleDOI

IoT Elements, Layered Architectures and Security Issues: A Comprehensive Survey.

TL;DR: This paper is presenting an overview about different layered architectures of IoT and attacks regarding security from the perspective of layers, and suggested a new secure layered architecture of IoT to overcome these issues.
Journal ArticleDOI

Intrusion detection systems for IoT-based smart environments: a survey

TL;DR: A comprehensive survey of the latest IDSs designed for the IoT model, with a focus on the corresponding methods, features, and mechanisms, and deep insight into the IoT architecture, emerging security vulnerabilities, and their relation to the layers of the IoT Architecture is provided.
Journal ArticleDOI

Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes.

TL;DR: The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks.
Proceedings ArticleDOI

Attack scenarios and security analysis of MQTT communication protocol in IoT system

TL;DR: This paper discusses several reasons on why there are many IoT system that does not implement adequate security mechanism in MQTT protocol and demonstrates and analyzes how to attack this protocol easily using several attack scenarios.
References
More filters
Journal ArticleDOI

The Internet of Things: A survey

TL;DR: This survey is directed to those who want to approach this complex discipline and contribute to its development, and finds that still major issues shall be faced by the research community.
Book

Cryptography and Network Security: Principles and Practice

TL;DR: The new edition of William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.
Journal ArticleDOI

Internet of Things - Technology and Value Added

TL;DR: The fields of application for IoT technologies are as numerous as they are diverse, as IoT solutions are increasingly extending to virtually all areas of everyday.
ReportDOI

The Constrained Application Protocol (CoAP)

TL;DR: The Constrained Application Protocol is a specialized web transfer protocol for use with constrained nodes and constrained networks, designed for machine- to-machine (M2M) applications such as smart energy and building automation.
Journal ArticleDOI

Internet of things - new security and privacy challenges

TL;DR: An adequate legal framework must take the underlying technology into account and would best be established by an international legislator, which is supplemented by the private sector according to specific needs and thereby becomes easily adjustable.
Related Papers (5)