Adaptive Security Framework for Resource-Constrained Internet-of-Things Platforms

The aim of this work is to investigate and define a dynamically adjustable security method, suitable especially for Wireless Sensor Networks (WSNs), usually composed by resource constrained devices. In order to support both the high level of security and the need for long lifetime of battery powered wireless devices, flexible means to adjust the level of security at runtime is needed. To this end, the paper proposes a solution, whose main component in the security between wireless sensors and the gateway is an Adaptive Security Manager (ASM), which can select the required level of security and inform the resource about it, based on the context. This makes it possible to support both high level of security and long lifetime of battery powered wireless devices when needed. Based on commands from the ASM, wireless sensors can select the suitable key from pre-shared keys (PSKs).

[1]  John Bigham,et al.  GEMOM - Significant and Measurable Progress beyond the State of the Art , 2008, 2008 Third International Conference on Systems and Networks Communications.

[2]  Mo-Yuen Chow,et al.  Optimal Tradeoff Between Performance and Security in Networked Control Systems Based on Coevolutionary Algorithms , 2012, IEEE Transactions on Industrial Electronics.

[3]  Roger M. Needham,et al.  Using encryption for authentication in large networks of computers , 1978, CACM.

[4]  Mo-Yuen Chow,et al.  Modeling and Optimizing the Performance-Security Tradeoff on D-NCS Using the Coevolutionary Paradigm , 2013, IEEE Transactions on Industrial Informatics.

[5]  Reijo Savola,et al.  Security-Measurability-Enhancing Mechanisms for a Distributed Adaptive Security Monitoring System , 2010, 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies.

[6]  Nicolae Tapus,et al.  Adaptive Security Framework for Wireless Sensor Networks , 2012, 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems.

[7]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[8]  Jamal Bentahar,et al.  How to Distribute the Detection Load among Virtual Machines to Maximize the Detection of Distributed Attacks in the Cloud? , 2016, 2016 IEEE International Conference on Services Computing (SCC).