Abstract

IoT end devices essential security parameters are Confidentiality, Integrity, Authenticity and Availability(CIAA). Breach of any of these security parameters means compromise with security thus collapsing the device. Even partial breach in security refers to loop holes in security hence unsecure IoT end device. Due to wearable nature of IoT end devices implementing security and maintaining lightweight is a challenge. Conventional security algorithms incur memory and processing overheads in wearable IoT end devices therefore lightweight security algorithms is compulsory. The existing architectures merely consider security enhancement using conventional security algorithm without focusing on lightweight therefore this paper analyzes existing IoT end device architectures and concludes that all are overarchitectured. Due to over- architecture the components of existing architectures are more visible to the external world and invites more attacks hence unsecured. On the other hand lightweight IoT end device resources ensure less complexity hence less internal bugs, less attack surface area, less visibility to external world thus more secure.
 Mandatory security requirements in wearable IoT end devices are still an extensive research issue. Therefore this paper focuses on mandatory boot process security requirements, software security requirements and security requirements during communication. Our proposed architecture is implemented over ESP32 microcontroller with the application of Arduino IDE. Lightweight secured internet of things (SIT) algorithm was implemented for lightweight CIAA due to light security requirements in wearable devices. Finally this paper compares the latest lightweight and secure architecture with the proposed lightweight and secure architecture and concludes that proposed architecture is robust in terms of lightweight and security.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.