Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview
Open Access
- 2 April 2013
- journal article
- research article
- Published by MDPI AG in Algorithms
- Vol. 6 (2), 197-226
- https://doi.org/10.3390/a6020197
Abstract
The Internet of Things (IoT) refers to the Internet-like structure of billions of interconnected constrained devices, denoted as “smart objects”. Smart objects have limited capabilities, in terms of computational power and memory, and might be battery-powered devices, thus raising the need to adopt particularly energy efficient technologies. Among the most notable challenges that building interconnected smart objects brings about, there are standardization and interoperability. The use of IP has been foreseen as the standard for interoperability for smart objects. As billions of smart objects are expected to come to life and IPv4 addresses have eventually reached depletion, IPv6 has been identified as a candidate for smart-object communication. The deployment of the IoT raises many security issues coming from (i) the very nature of smart objects, e.g., the adoption of lightweight cryptographic algorithms, in terms of processing and memory requirements; and (ii) the use of standard protocols, e.g., the need to minimize the amount of data exchanged between nodes. This paper provides a detailed overview of the security challenges related to the deployment of smart objects. Security protocols at network, transport, and application layers are discussed, together with lightweight cryptographic algorithms proposed to be used instead of conventional and demanding ones, in terms of computational resources. Security aspects, such as key distribution and security bootstrapping, and application scenarios, such as secure data aggregation and service authorization, are also discussed.Keywords
This publication has 76 references indexed in Scilit:
- Pupil dilation in the Simon task as a marker of conflict processingFrontiers in Human Neuroscience, 2013
- The role of affect and reward in the conflict-triggered adjustment of cognitive controlFrontiers in Human Neuroscience, 2012
- Dissociable Effects of Valence and Arousal in Adaptive Executive ControlPLOS ONE, 2011
- Adaptation to Conflict via Context-Driven Anticipatory Signals in the Dorsomedial Prefrontal CortexJournal of Neuroscience, 2011
- The dorsal medial frontal cortex is sensitive to time on task, not response conflict or error likelihoodNeuroImage, 2011
- Negative Emotion Impairs Conflict-Driven Executive ControlFrontiers in Psychology, 2011
- Pupillary Stroop effectsCognitive Processing, 2010
- Sources of avoidance motivation: Valence effects from physical effort and mental rotationMotivation and Emotion, 2010
- Decision making and the avoidance of cognitive demand.Journal of Experimental Psychology: General, 2010
- The pupil as a measure of emotional arousal and autonomic activationPsychophysiology, 2008