12,539 research outputs found
BLEND: Efficient and blended IoT data storage and communication with application layer security
Many IoT use cases demand both secure storage and secure communication.
Resource-constrained devices cannot afford having one set of crypto protocols
for storage and another for communication. Lightweight application layer
security standards are being developed for IoT communication. Extending these
protocols for secure storage can significantly reduce communication latency and
local processing.
We present BLEND, combining secure storage and communication by storing IoT
data as pre-computed encrypted network packets. Unlike local methods, BLEND not
only eliminates separate crypto for secure storage needs, but also eliminates a
need for real-time crypto operations, reducing the communication latency
significantly. Our evaluation shows that compared with a local solution, BLEND
reduces send latency from 630 microseconds to 110 microseconds per packet.
BLEND enables PKI based key management while being sufficiently lightweight for
IoT. BLEND doesn't need modifications to communication standards used when
extended for secure storage, and can therefore preserve underlying protocols'
security guarantees.Comment: Accepted in IEEE CSR 2022. 10 pages, 7 figure
A survey of communication protocols for internet of things and related challenges of fog and cloud computing integration
The fast increment in the number of IoT (Internet of Things) devices is accelerating the research on new solutions to make cloud services scalable. In this context, the novel concept of fog computing as well as the combined fog-to-cloud computing paradigm is becoming essential to decentralize the cloud, while bringing the services closer to the end-system. This article surveys e application layer communication protocols to fulfill the IoT communication requirements, and their potential for implementation in fog- and cloud-based IoT systems. To this end, the article first briefly presents potential protocol candidates, including request-reply and publish-subscribe protocols. After that, the article surveys these protocols based on their main characteristics, as well as the main performance issues, including latency, energy consumption, and network throughput. These findings are thereafter used to place the protocols in each segment of the system (IoT, fog, cloud), and thus opens up the discussion on their choice, interoperability, and wider system integration. The survey is expected to be useful to system architects and protocol designers when choosing the communication protocols in an integrated IoT-to-fog-to-cloud system architecture.Peer ReviewedPostprint (author's final draft
Smooth Number Message Authentication Code in the IoT Landscape
This paper presents the Smooth Number Message Authentication Code (SNMAC) for
the context of lightweight IoT devices. The proposal is based on the use of
smooth numbers in the field of cryptography, and investigates how one can use
them to improve the security and performance of various algorithms or security
constructs. The literature findings suggest that current IoT solutions are
viable and promising, yet they should explore the potential usage of smooth
numbers. The methodology involves several processes, including the design,
implementation, and results evaluation. After introducing the algorithm,
provides a detailed account of the experimental performance analysis of the
SNMAC solution, showcasing its efficiency in real-world scenarios. Furthermore,
the paper also explores the security aspects of the proposed SNMAC algorithm,
offering valuable insights into its robustness and applicability for ensuring
secure communication within IoT environments.Comment: 19 pages, 7 figure
- …