计算机科学
密码学
密码原语
密码协议
云计算
计算机安全
GSM演进的增强数据速率
物联网
节点(物理)
边缘计算
计算机网络
分布式计算
电信
工程类
结构工程
操作系统
作者
Muhammad Nauman Khan,Asha Rao,Seyit Camtepe
标识
DOI:10.1109/jiot.2020.3026493
摘要
Internet of Things (IoT) is an emergent and evolving technology, interconnecting the cyber and physical worlds. IoT technology finds applications in a broad spectrum of areas such as homes, health, water and sanitation, transportation, and environmental monitoring. However, the endless opportunities and benefits of IoT come with many security challenges due to the reduced computation, communication, storage, and energy capabilities of the IoT smart devices. Several computationally lightweight cryptographic protocols exist for these resource-constrained IoT smart devices. However, lightweight solutions render the resource-rich ends of the IoT systems (e.g., edge, fog, or cloud modes) vulnerable as nodes at those ends have the capacity for computationally heavier cryptographic protocols, and they operate in relatively more malicious environments. This asymmetric computational nature of IoT systems requires security protocols that can adapt to the resource availability at the node that they operate. This survey describes the IoT structure, computational capabilities of the devices at the end, edge, fog, and cloud platforms, and classifies existing lightweight cryptographic protocols. The comparative analysis of the existing lightweight cryptographic solutions along with their advantages, drawbacks, and vulnerabilities highlights the need for elastic cryptographic protocols which are capable of adapting to the asymmetric capabilities of the different nodes in IoT systems.
科研通智能强力驱动
Strongly Powered by AbleSci AI