Adaptive Security Framework for Resource-Constrained Internet-of-Things Platforms

被引:0
|
作者
Ferrera, Enrico [1 ]
Rossini, Rosaria [1 ]
Conzon, Davide [1 ]
Pastrone, Claudio [1 ]
Tassone, Sandro [2 ]
机构
[1] ISMB, Pervas Technol Res Area, Via Pier Carlo Boggio 61, I-10138 Turin, Italy
[2] Politecn Torino, Dipartimento Automat & Informat DAUIN, Corso Duca Abruzzi 24, I-10129 Turin, Italy
关键词
Adaptive Security; Internet-of-Things; Wireless Sensors Network; Constrained Devices;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The aim of this work is to investigate and define a dynamically adjustable security method, suitable especially for Wireless Sensor Networks (WSNs), usually composed by resource constrained devices. In order to support both the high level of security and the need for long lifetime of battery powered wireless devices, flexible means to adjust the level of security at runtime is needed. To this end, the paper proposes a solution, whose main component in the security between wireless sensors and the gateway is an Adaptive Security Manager (ASM), which can select the required level of security and inform the resource about it, based on the context. This makes it possible to support both high level of security and long lifetime of battery powered wireless devices when needed. Based on commands from the ASM, wireless sensors can select the suitable key from pre-shared keys (PSKs).
引用
收藏
页数:5
相关论文
共 50 条
  • [1] An Efficient Security Scheme for the Internet of Things with Resource-Constrained Devices
    Wu, Xin-Wen
    Farag, Waleed
    Ali, Sanwar
    Kulkarni, Siddhivinayak
    [J]. 2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2019, : 679 - 685
  • [2] CapeVM: A Safe and Fast Virtual Machine for Resource-Constrained Internet-of-Things Devices
    Reijers, Niels
    Shih, Chi-Sheng
    [J]. SENSYS'18: PROCEEDINGS OF THE 16TH CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS, 2018, : 250 - 263
  • [3] Edge-Host Partitioning of Deep Neural Networks with Feature Space Encoding for Resource-Constrained Internet-of-Things Platforms
    Ko, Jong Hwan
    Na, Taesik
    Amir, Mohammad Faisal
    Mukhopadhyay, Saibal
    [J]. 2018 15TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED VIDEO AND SIGNAL BASED SURVEILLANCE (AVSS), 2018, : 103 - 108
  • [4] Intelligent Resource Inquisition Framework on Internet-of-Things
    Bharti, Monika
    Saxena, Sharad
    Kumar, Rajesh
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2017, 58 : 265 - 281
  • [5] Optimal resource selection framework for Internet-of-Things
    Bharti, Monika
    Kumar, Rajesh
    Saxena, Sharad
    Jindal, Himanshu
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2020, 86 (86)
  • [6] An Assessment of Internet of Things Protocols for Resource-Constrained Applications
    Mun, Dae-Hyeok
    Minh Le Dinh
    Kwon, Young-Woo
    [J]. PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS, VOL 1, 2016, : 555 - 560
  • [7] Edge-based auditing method for data security in resource-constrained Internet of Things
    Wang, Tian
    Mei, Yaxin
    Liu, Xuxun
    Wang, Jin
    Dai, Hong-Ning
    Wang, Zhijian
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 114
  • [8] Nanoelectronic Security Designs for Resource-Constrained Internet of Things Devices Finding security solutions with nanoelectronic hardwares
    Uddin, Mesbah
    Majumder, Badruddoja
    Rose, Garrett S.
    [J]. IEEE CONSUMER ELECTRONICS MAGAZINE, 2018, 7 (06) : 15 - 22
  • [9] A Framework for Evaluating Internet-of-Things Platforms: Application Provider Viewpoint
    Mazhelis, Oleksiy
    Tyrvainen, Pasi
    [J]. 2014 IEEE WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2014, : 147 - 152
  • [10] Lightweight Management of Resource-Constrained Sensor Devices in Internet of Things
    Sheng, Zhengguo
    Wang, Hao
    Yin, Changchuan
    Hu, Xiping
    Yang, Shusen
    Leung, Victor C. M.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2015, 2 (05): : 402 - 411