Procedures for sensor nodes operation in the secured domain
暂无分享,去创建一个
Currently, the networks of mobile sensor nodes, which are IoT components, are increasingly a source of data for building situational awareness. Such networks can be a source of data for critical infrastructure systems if, in addition to the timeliness (freshness) of the data, it will also be possible to ensure the reliability of these data. Such requirements are met by a secure domain of sensor nodes, in which all sensor nodes are authenticated, sensitive data is stored in protected resources of sensor nodes, and data exchange in the domain and outside the domain is cryptographically protected. This paper presents the concept of a safe domain of sensor nodes for IoT and describes the data structures necessary to ensure security in the domain and the way of protecting the resources of each node. Particular attention was paid to the procedure of preparing a sensor node for work in a secured domain of sensor nodes.
[1] Rahim Tafazolli,et al. Adaptive Clustering for Dynamic IoT Data Streams , 2017, IEEE Internet of Things Journal.
[2] Janusz Furtak,et al. Secured Domain of Sensor Nodes - A New Concept , 2018, I4CS.
[3] Qasem Abu Al-Haija,et al. A Tiny RSA Cryptosystem based on Arduino Microcontroller Useful for Small Scale Networks , 2014, FNC/MobiSPC.
[4] Sandhya Koteshwara,et al. Comparative Study of Authenticated Encryption Targeting Lightweight IoT Applications , 2017, IEEE Design & Test.