Abstract
The importance of securing communications on the Internet of Things (IoT) cannot be overstated. This is especially the case in light of the increasing proliferation of IoT devices and instances, as well as the growing dependence on their usage. Meanwhile, there have recently been mounting concerns over a wide array of vulnerabilities in IoT communications. The objective of this work is to address constraints in IoT devices that are “resource-constrained”, which are devices that are limited in terms of computing, energy, communication, or range capabilities, whether in terms of nominal or temporal limitations. Specifically, we propose a framework for resource-aiding constrained devices to facilitate secure communication. Without loss of generalization, the framework’s viability is illustrated by focusing on a group of security functions that utilize message authentication codes, which is a strongly representative example of resource-intensive security functions. Aspects of the framework are further demonstrated in processing cores commonly used in commercial IoT devices.
Highlights
The Internet has long outgrown being a convenient mode of communication
The communication mode for such physical things is often characterized as being machine type communication (MTC), with direct interaction sometimes labeled as device-to-device (D2D) communication
To achieve adaptive resource-aiding security services, we propose that all aiders utilize a form of adaptive communication security strategy
Summary
Beyond its importance for myriad financial and social interactions, the Internet plays an increasingly critical role across a wide range of applications including content distribution, distributed (and/or) cloud computing, softwarization/virtualization, decentralized ledgering, and sensing and actuation. In response to these and other applications, the requirements for reliable and scalable performances have substantially evolved, along with an inevitable emphasis on communication security [1]. A “Thing” can be a software instance, whether logical or virtualized, e.g., a mobile agent, a crawler, or even a basic thread Such heterogeneity in definition further necessitates the need for reliable and scalable performance. It challenges the realization of secure IoT communication [2,3]
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have