Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
A Distributed Security Mechanism for Resource-Constrained IoT Devices
Luleå University of Technology.
Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
2016 (English)In: Informatica, ISSN 0350-5596, E-ISSN 1854-3871, Vol. 40, no 1, 133-143 p.Article in journal (Refereed) Published
Abstract [en]

Internet of Things (IoT) devices have developed to comprise embedded systems and sensors with the ability to connect, collect, and transmit data over the Internet. Although solutions to secure IoT systems exist, Class-0 IoT devices with insufficient resources to support such solutions are considered a resource constrained in terms of secure communication. This paper provides a distributed security mechanism that targets Class-0 IoT devices. The research goal is to secure the entire data path in two segments, device-to-gateway and gateway-to-server data communications. The main concern in the provided solution is that lighter security operations with minimal resource requirements are performed in the IoT device, while heavier tasks are performed in the gateway side. The proposed mechanism utilizes a symmetric encryption for data objects combined with the native wireless security to offer a layered security technique between the device and the gateway. In the offered solution, the IoT gateways provide additional protection by securing data using Transport Layer Security (TLS). Real-time experimental evaluations have demonstrated the applicability of the proposed mechanism pertaining to the security assurance and the consumed resources of the target Class-0 IoT devices.

Place, publisher, year, edition, pages
2016. Vol. 40, no 1, 133-143 p.
National Category
Information Systems, Social aspects
Research subject
Information systems
Identifiers
URN: urn:nbn:se:ltu:diva-9632Local ID: 84b7b131-da76-4410-80c0-9867bb35a477OAI: oai:DiVA.org:ltu-9632DiVA: diva2:982570
Note
Validerad; 2016; Nivå 2; 20160317 (ismawa)Available from: 2016-09-29 Created: 2016-09-29 Last updated: 2017-11-24Bibliographically approved

Open Access in DiVA

fulltext(1695 kB)145 downloads
File information
File name FULLTEXT01.pdfFile size 1695 kBChecksum SHA-512
43984ead6492684c8c2eb55e5ff0c2a9ff780fdb4a3fde178b2bf81d4a875cdf7a830ffdf687ab28ab975719cca0578a2e65574f4b64b2d4368c0285fbd98f23
Type fulltextMimetype application/pdf

Authority records BETA

Awad, Ali Ismail

Search in DiVA

By author/editor
Awad, Ali Ismail
By organisation
Computer Science
In the same journal
Informatica
Information Systems, Social aspects

Search outside of DiVA

GoogleGoogle Scholar
Total: 145 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 144 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf