TY - JOUR
T1 - Reconfigurable Security
T2 - Edge-Computing-Based Framework for IoT
AU - Hsu, Ruei Hau
AU - Lee, Jemin
AU - Quek, Tony Q.S.
AU - Chen, Jyh Cheng
N1 - Funding Information:
Acknowledgment This work was supported in part by a National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIP) (No. 2017R1C1B2009280), the DGIST R&D Program of the Ministry of Science and ICT (17-ST-02), a Temasek Research Fellowship, a National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (NRF-2018R1A5A1060031), and the Taiwan Information Security Center at NSYSU (TWISC@ NSYSU).
Publisher Copyright:
© 2018 IEEE.
PY - 2018/9/1
Y1 - 2018/9/1
N2 - In various scenarios, achieving security between IoT devices is challenging since the devices may have different dedicated communication standards and resource constraints as well as various applications. In this article, we first provide requirements and existing solutions for IoT security. We then introduce a new reconfigurable security framework based on edge computing, which utilizes a near-user edge device, that is, a security agent, to support security functions as IoT resources for the security requirements of all protocol layers including multiple applications on an IoT device. This framework is designed to overcome the challenges including high computation costs, low flexibility in key management, and low compatibility in deploying new security algorithms in IoT, especially when adopting advanced cryptographic primitives. We also provide the design principles of the reconfigurable security framework, the exemplary security protocols for anonymous authentication and secure data access control, and the performance analysis in terms of feasibility and usability. The reconfigurable security framework paves a new way to strengthen IoT security by edge computing.
AB - In various scenarios, achieving security between IoT devices is challenging since the devices may have different dedicated communication standards and resource constraints as well as various applications. In this article, we first provide requirements and existing solutions for IoT security. We then introduce a new reconfigurable security framework based on edge computing, which utilizes a near-user edge device, that is, a security agent, to support security functions as IoT resources for the security requirements of all protocol layers including multiple applications on an IoT device. This framework is designed to overcome the challenges including high computation costs, low flexibility in key management, and low compatibility in deploying new security algorithms in IoT, especially when adopting advanced cryptographic primitives. We also provide the design principles of the reconfigurable security framework, the exemplary security protocols for anonymous authentication and secure data access control, and the performance analysis in terms of feasibility and usability. The reconfigurable security framework paves a new way to strengthen IoT security by edge computing.
UR - https://www.scopus.com/pages/publications/85054499949
UR - https://www.scopus.com/pages/publications/85054499949#tab=citedBy
U2 - 10.1109/MNET.2018.1700284
DO - 10.1109/MNET.2018.1700284
M3 - Article
AN - SCOPUS:85054499949
SN - 0890-8044
VL - 32
SP - 92
EP - 99
JO - IEEE Network
JF - IEEE Network
IS - 5
M1 - 8473487
ER -