Algorithms 2013, 6(2), 197-226; doi:10.3390/a6020197
Article

Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview

* email, email and email
Received: 6 December 2012; in revised form: 8 February 2013 / Accepted: 7 March 2013 / Published: 2 April 2013
(This article belongs to the Special Issue Sensor Network)
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract: The Internet of Things (IoT) refers to the Internet-like structure of billions of interconnected constrained devices, denoted as “smart objects”. Smart objects have limited capabilities, in terms of computational power and memory, and might be battery-powered devices, thus raising the need to adopt particularly energy efficient technologies. Among the most notable challenges that building interconnected smart objects brings about, there are standardization and interoperability. The use of IP has been foreseen as the standard for interoperability for smart objects. As billions of smart objects are expected to come to life and IPv4 addresses have eventually reached depletion, IPv6 has been identified as a candidate for smart-object communication. The deployment of the IoT raises many security issues coming from (i) the very nature of smart objects, e.g., the adoption of lightweight cryptographic algorithms, in terms of processing and memory requirements; and (ii) the use of standard protocols, e.g., the need to minimize the amount of data exchanged between nodes. This paper provides a detailed overview of the security challenges related to the deployment of smart objects. Security protocols at network, transport, and application layers are discussed, together with lightweight cryptographic algorithms proposed to be used instead of conventional and demanding ones, in terms of computational resources. Security aspects, such as key distribution and security bootstrapping, and application scenarios, such as secure data aggregation and service authorization, are also discussed.
Keywords: security; lightweight cryptography; Internet of Things (IoT); smart objects; secure communication protocols; secure data aggregation
PDF Full-text Download PDF Full-Text [442 KB, Updated Version, uploaded 11 April 2013 16:47 CEST]
The original version is still available [442 KB, uploaded 2 April 2013 16:12 CEST]

Export to BibTeX |
EndNote


MDPI and ACS Style

Cirani, S.; Ferrari, G.; Veltri, L. Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview. Algorithms 2013, 6, 197-226.

AMA Style

Cirani S, Ferrari G, Veltri L. Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview. Algorithms. 2013; 6(2):197-226.

Chicago/Turabian Style

Cirani, Simone; Ferrari, Gianluigi; Veltri, Luca. 2013. "Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview." Algorithms 6, no. 2: 197-226.

Algorithms EISSN 1999-4893 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert