End-to-end Security in the IoT Computing Continuum: Perspectives in the SWAMP Project

被引:5
|
作者
Kleinschmidt, Joao H. [1 ]
Kamienski, Carlos [1 ]
Prati, Ronaldo C. [1 ]
Kolehmainen, Kari [2 ]
Aguzzi, Cristiano [3 ]
机构
[1] Fed Univ ABC, Santo Andre, SP, Brazil
[2] VTT Tech Res Ctr Finland, Oulu, Finland
[3] Univ Bologna, Bologna, Italy
关键词
Internet of Things; Smart Water Management; IoT Computing Continuum; Security;
D O I
10.1109/ladc48089.2019.8995724
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The use of the Internet of Things (IoT) and other related technologies in precision irrigation for agriculture may optimize the use of water, reduce energy consumption, and improve the quality of crops. The SWAMP project is implementing IoT in this domain in four pilots in Europe and Brazil, where heterogeneous devices and distributed components form an IoT Computing Continuum. The security of IoT systems is a challenging task, as these systems present distinctive characteristics when compared to traditional cloud-based systems. Approaches to secure data generated in the sensors until the user's application is a challenging task. This paper discusses how the SWAMP project is dealing with end-to-end security and technologies for the application of IoT in agriculture.
引用
收藏
页码:191 / 192
页数:2
相关论文
共 50 条
  • [31] HeComm: end-to-end secured communication in a heterogeneous IoT environment via fog computing
    Winderickx, Joni
    Singelee, Dave
    Mentens, Nele
    2018 15TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2018,
  • [32] Enhancing End-to-End Communication Security in IoT Devices Through Application Layer Protocol
    Zahid, Rimsha
    Anwar, Muhammad Waseem
    Azam, Farooque
    Amjad, Anam
    Mukhtar, Danish
    INFORMATION AND SOFTWARE TECHNOLOGIES, ICIST 2022, 2022, 1665 : 148 - 159
  • [33] iTLS/iDTLS: Lightweight End-to-End Security Protocol for IoT Through Minimal Latency
    Li, Pengkun
    Su, Jinshu
    Wang, Xiaofeng
    PROCEEDINGS OF THE 2019 ACM SIGCOMM CONFERENCE POSTERS AND DEMOS (SIGCOMM '19), 2019, : 166 - 168
  • [34] Erratum to: Secure IoT framework and 2D architecture for End-To-End security
    Jongseok Choi
    Youngjin In
    Changjun Park
    Seonhee Seok
    Hwajeong Seo
    Howon Kim
    The Journal of Supercomputing, 2018, 74 : 3536 - 3536
  • [35] End-to-end programmable computing systems
    Yao Xiao
    Guixiang Ma
    Nesreen K. Ahmed
    Mihai Capotă
    Theodore L. Willke
    Shahin Nazarian
    Paul Bogdan
    Communications Engineering, 2 (1):
  • [36] IoT ETEI: End-to-end IoT device identification method
    Yin, Feihong
    Yang, Li
    Wang, Yuchen
    Dai, Jiahao
    2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2021,
  • [37] End-To-End Security for Video Distribution
    Boho, Andras
    Van Wallendael, Glenn
    Dooms, Ann
    De Cock, Jan
    Braeckman, Geert
    Schelkens, Peter
    Preneel, Bart
    Van de Walle, Rik
    IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (02) : 97 - 107
  • [38] An end-to-end security solution for SCTP
    Lindskog, Stefan
    Brunstrom, Anna
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 526 - +
  • [39] A transparent end-to-end security solution
    Thomas, S
    Misra, D
    Eswari, PRL
    Babu, NSC
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2005, 3803 : 336 - 339
  • [40] Synthesising End-to-End Security Protocols
    Thevathayan, Charles
    Bertok, Peter
    Fernandez, George
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 440 - 447