Open AccessThis article is
- freely available
Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview
Department of Information Engineering, University of Parma, Parco Area delle Scienze 181/A, 43124,Parma, Italy
* Author to whom correspondence should be addressed.
Received: 6 December 2012; in revised form: 8 February 2013 / Accepted: 7 March 2013 / Published: 2 April 2013
Abstract: The Internet of Things (IoT) refers to the Internet-like structure of billions of interconnected constrained devices, denoted as “smart objects”. Smart objects have limited capabilities, in terms of computational power and memory, and might be battery-powered devices, thus raising the need to adopt particularly energy efficient technologies. Among the most notable challenges that building interconnected smart objects brings about, there are standardization and interoperability. The use of IP has been foreseen as the standard for interoperability for smart objects. As billions of smart objects are expected to come to life and IPv4 addresses have eventually reached depletion, IPv6 has been identified as a candidate for smart-object communication. The deployment of the IoT raises many security issues coming from (i) the very nature of smart objects, e.g., the adoption of lightweight cryptographic algorithms, in terms of processing and memory requirements; and (ii) the use of standard protocols, e.g., the need to minimize the amount of data exchanged between nodes. This paper provides a detailed overview of the security challenges related to the deployment of smart objects. Security protocols at network, transport, and application layers are discussed, together with lightweight cryptographic algorithms proposed to be used instead of conventional and demanding ones, in terms of computational resources. Security aspects, such as key distribution and security bootstrapping, and application scenarios, such as secure data aggregation and service authorization, are also discussed.
Keywords: security; lightweight cryptography; Internet of Things (IoT); smart objects; secure communication protocols; secure data aggregation
Citations to this Article
Cite This Article
MDPI and ACS Style
Cirani, S.; Ferrari, G.; Veltri, L. Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview. Algorithms 2013, 6, 197-226.
Cirani S, Ferrari G, Veltri L. Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview. Algorithms. 2013; 6(2):197-226.
Cirani, Simone; Ferrari, Gianluigi; Veltri, Luca. 2013. "Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview." Algorithms 6, no. 2: 197-226.