Next Article in Journal
A Novel Vehicle Tracking ID Switches Algorithm for Driving Recording Sensors
Previous Article in Journal
Challenges for Microelectronics in Non-Invasive Medical Diagnostics
Previous Article in Special Issue
Trust Based Multipath QoS Routing Protocol for Mission-Critical Data Transmission in Tactical Ad-Hoc Networks
Open AccessArticle

Secure Communications for Resource-Constrained IoT Devices

Electric Engineering Department, Alfaisal University, PO Box 50927, Riyadh 11533, Saudi Arabia
School of Computing, Queen’s University, Kingston, ON K7L 2N6, Canada
Author to whom correspondence should be addressed.
This manuscript is the extension of the conference paper: Rashwan, A. M.; Taha, A.-E. M.; Hassanein, H.S. Using Aiders for Securing Communications of Resource-Challenged Mobile Devices. In Proceedings of the IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019.
Sensors 2020, 20(13), 3637;
Received: 22 May 2020 / Revised: 23 June 2020 / Accepted: 24 June 2020 / Published: 29 June 2020
(This article belongs to the Special Issue Security and Privacy in Wireless Sensor Network)
The importance of securing communications on the Internet of Things (IoT) cannot be overstated. This is especially the case in light of the increasing proliferation of IoT devices and instances, as well as the growing dependence on their usage. Meanwhile, there have recently been mounting concerns over a wide array of vulnerabilities in IoT communications. The objective of this work is to address constraints in IoT devices that are “resource-constrained”, which are devices that are limited in terms of computing, energy, communication, or range capabilities, whether in terms of nominal or temporal limitations. Specifically, we propose a framework for resource-aiding constrained devices to facilitate secure communication. Without loss of generalization, the framework’s viability is illustrated by focusing on a group of security functions that utilize message authentication codes, which is a strongly representative example of resource-intensive security functions. Aspects of the framework are further demonstrated in processing cores commonly used in commercial IoT devices. View Full-Text
Keywords: IoT Security; resource-aiding; resource-lending; mobile computing security; next-generation Internet security IoT Security; resource-aiding; resource-lending; mobile computing security; next-generation Internet security
Show Figures

Figure 1

MDPI and ACS Style

Taha, A.-E.M.; Rashwan, A.M.; Hassanein, H.S. Secure Communications for Resource-Constrained IoT Devices. Sensors 2020, 20, 3637.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

Search more from Scilit
Back to TopTop