Abstract
The Internet of things (IoT) faces unique security challenges due to its resource constrained devices. Limited processing, storage, memory and power of IoT objects do not support the deployment of advanced security protocols, which are often resource intensive, e.g., the use of Public Key Infrastructure (PKI) to ensures secure end-to-end communications between devices and services over the Internet. There are several approaches in the literature to improve the efficiency of communication protocols employed in PKI environments. Some researchers advocate decreasing the size of the x.509 certificates or fine tuning the DTLS handshake. Others investigated using neighbouring or virtual resources to perform the complex cryptographic algorithms on behalf of IoT constrained devices or using two factor authentication via an authorisation server to delegate authentication and authorisation. This paper surveys attempts in the literature to reduce the overhead incurred by IoT devices running complex PKI security protocols. It is evident from the literature that there is no universal solution for IoT constrained devices, instead, a selection of algorithms and frameworks is needed depending on the levels of interoperability, network scalable needs and ultimately how constrained the IoT devices are.
| Original language | English |
|---|---|
| Title of host publication | Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, ICFNDS 2018 |
| Publisher | Association for Computing Machinery |
| ISBN (Electronic) | 9781450364287 |
| DOIs | |
| State | Published - 26 Jun 2018 |
| Externally published | Yes |
Publication series
| Name | ACM International Conference Proceeding Series |
|---|
Bibliographical note
Publisher Copyright:© 2018 ACM.
Keywords
- Computer Security
- Internet of Things
- IoT threats
- Key escrow
- Offloading
- Privacy
- Public Key Infrastructure
ASJC Scopus subject areas
- Software
- Human-Computer Interaction
- Computer Vision and Pattern Recognition
- Computer Networks and Communications