Algorithms 2013, 6(2), 197-226; doi:10.3390/a6020197
Article

Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview

Department of Information Engineering, University of Parma, Parco Area delle Scienze 181/A, 43124,Parma, Italy
* Author to whom correspondence should be addressed.
Received: 6 December 2012; in revised form: 8 February 2013 / Accepted: 7 March 2013 / Published: 2 April 2013
(This article belongs to the Special Issue Sensor Network)
PDF Full-text Download PDF Full-Text [442 KB, Updated Version, uploaded 11 April 2013 16:47 CEST]
The original version is still available [442 KB, uploaded 2 April 2013 16:12 CEST]
Abstract: The Internet of Things (IoT) refers to the Internet-like structure of billions of interconnected constrained devices, denoted as “smart objects”. Smart objects have limited capabilities, in terms of computational power and memory, and might be battery-powered devices, thus raising the need to adopt particularly energy efficient technologies. Among the most notable challenges that building interconnected smart objects brings about, there are standardization and interoperability. The use of IP has been foreseen as the standard for interoperability for smart objects. As billions of smart objects are expected to come to life and IPv4 addresses have eventually reached depletion, IPv6 has been identified as a candidate for smart-object communication. The deployment of the IoT raises many security issues coming from (i) the very nature of smart objects, e.g., the adoption of lightweight cryptographic algorithms, in terms of processing and memory requirements; and (ii) the use of standard protocols, e.g., the need to minimize the amount of data exchanged between nodes. This paper provides a detailed overview of the security challenges related to the deployment of smart objects. Security protocols at network, transport, and application layers are discussed, together with lightweight cryptographic algorithms proposed to be used instead of conventional and demanding ones, in terms of computational resources. Security aspects, such as key distribution and security bootstrapping, and application scenarios, such as secure data aggregation and service authorization, are also discussed.
Keywords: security; lightweight cryptography; Internet of Things (IoT); smart objects; secure communication protocols; secure data aggregation

Article Statistics

Load and display the download statistics.

Citations to this Article

Cite This Article

MDPI and ACS Style

Cirani, S.; Ferrari, G.; Veltri, L. Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview. Algorithms 2013, 6, 197-226.

AMA Style

Cirani S, Ferrari G, Veltri L. Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview. Algorithms. 2013; 6(2):197-226.

Chicago/Turabian Style

Cirani, Simone; Ferrari, Gianluigi; Veltri, Luca. 2013. "Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview." Algorithms 6, no. 2: 197-226.

Algorithms EISSN 1999-4893 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert