EdgeSec: Design of an Edge Layer Security Service to Enhance IoT Security

With the widespread availability of connected smart devices, Internet of Things (IoT) is becoming the world's largest computing platform. These large-scale, heterogeneous and resource-constrained devices bring many significant new challenges to the design of efficient and reliable IoT systems. Security is one of the most crucial ones that need to be effectively addressed for the wide adoption of IoT systems. In this paper, we first present an in-depth analysis of security challenges in IoT. Then, we propose EdgeSec, the design of a novel security service which is deployed at the Edge layer to enhance the security of IoT systems. EdgeSec consists of seven major components that work together to systematically handle specific security challenges in IoT systems. Finally, the effectiveness of EdgeSec is demonstrated in the context of a typical IoT application, Smart Home.

[1]  Tero Kivinen Minimal Internet Key Exchange Version 2 (IKEv2) Initiator Implementation , 2016, RFC.

[2]  Cataldo Basile,et al.  Virtualized security at the network edge: a user-centric approach , 2015, IEEE Communications Magazine.

[3]  Srivaths Ravi,et al.  A study of the energy consumption characteristics of cryptographic algorithms and security protocols , 2006, IEEE Transactions on Mobile Computing.

[4]  Michael W. Condry,et al.  Using Smart Edge IoT Devices for Safer, Rapid Response With Industry IoT Control Operations , 2016, Proceedings of the IEEE.

[5]  Magdy A. Bayoumi,et al.  A Novel Authentication and Key Agreement Protocol for Internet of Things Based Resource-Constrained Body Area Sensors , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW).

[6]  Djamal Zeghlache,et al.  Lightweight collaborative key establishment scheme for the Internet of Things , 2014, Comput. Networks.

[7]  Kai Zhao,et al.  A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.

[8]  Hyeong-Ah Choi,et al.  Securing smart home: Technologies, security challenges, and security requirements , 2014, 2014 IEEE Conference on Communications and Network Security.

[9]  Andreas Jacobsson,et al.  Towards a model of privacy and security for smart homes , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).

[10]  Qian Zhu,et al.  IOT Gateway: BridgingWireless Sensor Networks into Internet of Things , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[11]  Weisong Shi,et al.  Security in Internet of Things: Opportunities and Challenges , 2016, 2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI).

[12]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[13]  Rodrigo Roman,et al.  Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..

[14]  Eric Rescorla,et al.  Datagram Transport Layer Security Version 1.2 , 2012, RFC.

[15]  Felix Wortmann,et al.  Internet of Things , 2015, Business & Information Systems Engineering.

[16]  Zhiwei Wang,et al.  A Secure and Efficient Framework to Read Isolated Smart Grid Devices , 2017, IEEE Transactions on Smart Grid.

[17]  Georg Carle,et al.  A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication , 2012, 37th Annual IEEE Conference on Local Computer Networks - Workshops.

[18]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[19]  Nicky Mouha,et al.  Report on Lightweight Cryptography , 2017 .

[20]  Thiemo Voigt,et al.  Lithe: Lightweight Secure CoAP for the Internet of Things , 2013, IEEE Sensors Journal.

[21]  J. Manyika,et al.  Disruptive technologies: Advances that will transform life, business, and the global economy , 2013 .

[22]  Ali Ismail Awad,et al.  A Distributed Security Mechanism for Resource-Constrained IoT Devices , 2016, Informatica.