End-to-end Security in the IoT Computing Continuum: Perspectives in the SWAMP Project

被引:5
|
作者
Kleinschmidt, Joao H. [1 ]
Kamienski, Carlos [1 ]
Prati, Ronaldo C. [1 ]
Kolehmainen, Kari [2 ]
Aguzzi, Cristiano [3 ]
机构
[1] Fed Univ ABC, Santo Andre, SP, Brazil
[2] VTT Tech Res Ctr Finland, Oulu, Finland
[3] Univ Bologna, Bologna, Italy
关键词
Internet of Things; Smart Water Management; IoT Computing Continuum; Security;
D O I
10.1109/ladc48089.2019.8995724
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The use of the Internet of Things (IoT) and other related technologies in precision irrigation for agriculture may optimize the use of water, reduce energy consumption, and improve the quality of crops. The SWAMP project is implementing IoT in this domain in four pilots in Europe and Brazil, where heterogeneous devices and distributed components form an IoT Computing Continuum. The security of IoT systems is a challenging task, as these systems present distinctive characteristics when compared to traditional cloud-based systems. Approaches to secure data generated in the sensors until the user's application is a challenging task. This paper discusses how the SWAMP project is dealing with end-to-end security and technologies for the application of IoT in agriculture.
引用
收藏
页码:191 / 192
页数:2
相关论文
共 50 条
  • [21] RETRACTED ARTICLE: Decentralized security framework for future IoT end-to-end connectivity
    Qin Xin
    Rubén González Crespo
    Carlos Enrique Montenegro-Marin
    Vicente García Díaz
    Mamoun Alazab
    Annals of Operations Research, 2023, 326 : 79 - 79
  • [22] Lightweight certificate revocation for low-power IoT with end-to-end security
    Hoglund, Joel
    Furuhed, Martin
    Raza, Shahid
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 73
  • [23] SEMIoTICS Architectural Framework: End-to-end Security, Connectivity and Interoperability for Industrial IoT
    Petroulakis, Nikolaos E.
    Lakka, Eftychia
    Sakic, Ermin
    Kulkarni, Vivek
    Fysarakis, Konstantinos
    Somarakis, Iason
    Serra, Jordi
    Sanabria-Russo, Luis
    Pau, Danilo
    Falchetto, Mirko
    Presenza, Domenico
    Marktscheffel, Tobias
    Ramantas, Kostas
    Mekikis, Prodromos-Vasileios
    Ciechomski, Lukasz
    Waledzik, Karolina
    2019 GLOBAL IOT SUMMIT (GIOTS), 2019,
  • [24] A decentralized scalable security framework for end-to-end authentication of future IoT communication
    Sheron, P. S. Febin
    Sridhar, K. P.
    Baskar, S.
    Shakeel, P. Mohamed
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2020, 31 (12)
  • [25] Secure IoT framework and 2D architecture for End-To-End security
    Choi, Jongseok
    In, Youngjin
    Park, Changjun
    Seok, Seonhee
    Seo, Hwajeong
    Kim, Howon
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (08): : 3521 - 3535
  • [26] Flexible IoT security middleware for end-to-end cloud-fog communication
    Mukherjee, Bidyut
    Wang, Songjie
    Lu, Wenyi
    Neupane, Roshan Lal
    Dunn, Daniel
    Ren, Yijie
    Su, Qi
    Calyam, Prasad
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 87 : 688 - 703
  • [27] END-TO-END SECURITY PROTECTION
    Nazaryan, Levon
    Panaousis, Emmanouil A.
    Politis, Christos
    IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2010, 5 (01): : 85 - 90
  • [28] A secure end-to-end IoT solution
    Mathur, Avijit
    Newe, Thomas
    Elgenaidi, Walid
    Rao, Muzaffar
    Dooly, Gerard
    Toal, Daniel
    SENSORS AND ACTUATORS A-PHYSICAL, 2017, 263 : 291 - 299
  • [29] End-to-End Management of IoT Applications
    Khazaei, Hamzeh
    Bannazadeh, Hadi
    Leon-Garcia, Alberto
    2017 IEEE CONFERENCE ON NETWORK SOFTWARIZATION (IEEE NETSOFT), 2017,
  • [30] The End-to-End Provenance Project
    Ellison, Aaron M.
    Boose, Emery R.
    Lerner, Barbara S.
    Fong, Elizabeth
    Seltzer, Margo
    PATTERNS, 2020, 1 (02):