Security architectures in constrained environments: A survey

Abstract This paper is a survey of the current work to understand the available security measures in the literature for constrained environments. First of all, this paper introduces the specific problem of security in constrained environments and the need for a consistent solution. The necessary set of security measures that must be present in an architecture is reviewed. Second, an overview of such consistent solutions in the literature is provided. Finally, a comparison of these solutions is performed based on the security and constraint aspects.

[1]  Hannes Tschofenig,et al.  Authentication and Authorization for Constrained Environments (ACE) , 2017 .

[2]  John Mattsson Using Transport Layer Security (TLS) to Secure OSCORE , 2017 .

[3]  Fernando Boavida,et al.  Why is IPSec a viable option for wireless sensor networks , 2008, 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[4]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[5]  William E. Burr,et al.  Recommendation for Key Management, Part 1: General (Revision 3) , 2006 .

[6]  Marco Tiloca,et al.  IPsec profile of ACE , 2017 .

[7]  Paul Fremantle,et al.  MQTT-TLS profile of ACE , 2020 .

[8]  Francesca Palombini,et al.  OSCORE profile of the Authentication and Authorization for Constrained Environments Framework , 2020 .

[9]  Oscar Garcia-Morchon,et al.  State-of-the-Art and Challenges for the Internet of Things Security , 2018 .

[10]  Francesca Palombini,et al.  Ephemeral Diffie-Hellman Over COSE (EDHOC) , 2019 .

[11]  Hannes Tschofenig,et al.  Securing the Internet of Things: A Standardization Perspective , 2014, IEEE Internet of Things Journal.

[12]  Jari Arkko,et al.  Practical Considerations and Implementation Experiences in Securing Smart Object Networks , 2018, RFC.

[13]  Rafael Lopez,et al.  EAP-based Authentication Service for CoAP , 2017 .

[14]  Ludwig Seitz,et al.  Object Security for Constrained RESTful Environments (OSCORE) , 2019, RFC.

[15]  Jorge Sá Silva,et al.  Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.

[16]  Behcet Sarikaya,et al.  Secure IoT Bootstrapping: A Survey , 2020 .