Next Article in Journal
C6EnPLS: A High-Performance Computing Job Dataset for the Analysis of Linear Solvers’ Power Consumption
Previous Article in Journal
Optimizing Internet of Things Services Placement in Fog Computing Using Hybrid Recommendation System
Previous Article in Special Issue
A Survey on Cybersecurity in IoT
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Review

SoK: Delegated Security in the Internet of Things

1
Faculty of Computer Science and Mathematics, University of Passau, 94032 Passau, Germany
2
Cryptography and Cyber Security, Department of Computer and Information Science, University of Konstanz, 78464 Konstanz, Germany
*
Authors to whom correspondence should be addressed.
Future Internet 2025, 17(5), 202; https://doi.org/10.3390/fi17050202
Submission received: 27 March 2025 / Revised: 25 April 2025 / Accepted: 29 April 2025 / Published: 30 April 2025
(This article belongs to the Special Issue Cybersecurity in the IoT)

Abstract

The increased use of electronic devices in the Internet of Things (IoT) leads not only to an improved comfort of living but also to an increased risk of attacks. IoT security has thus become an important research field. However, due to limits on performance and bandwidth, IoT devices are often not powerful enough to execute, e.g., costly cryptographic algorithms or protocols. This limitation can be solved through a delegation concept. By delegating certain operations to devices with sufficient resources, it is possible to achieve a high level of security without overloading a device that needs protection. In this paper, we give an overview of current approaches for security delegation in the context of IoT, formalise security notions, discuss the security of existing approaches, and identify further research questions. Furthermore, a mathematical formalisation of the CIA triad (confidentiality, integrity, and availability) is proposed for the predefined application areas, in order to evaluate the different approaches.
Keywords: Internet of Things; delegation; security; access control; authorisation; computation; authentication Internet of Things; delegation; security; access control; authorisation; computation; authentication

Share and Cite

MDPI and ACS Style

Geloczi, E.; Klement, F.; Struck, P.; Katzenbeisser, S. SoK: Delegated Security in the Internet of Things. Future Internet 2025, 17, 202. https://doi.org/10.3390/fi17050202

AMA Style

Geloczi E, Klement F, Struck P, Katzenbeisser S. SoK: Delegated Security in the Internet of Things. Future Internet. 2025; 17(5):202. https://doi.org/10.3390/fi17050202

Chicago/Turabian Style

Geloczi, Emiliia, Felix Klement, Patrick Struck, and Stefan Katzenbeisser. 2025. "SoK: Delegated Security in the Internet of Things" Future Internet 17, no. 5: 202. https://doi.org/10.3390/fi17050202

APA Style

Geloczi, E., Klement, F., Struck, P., & Katzenbeisser, S. (2025). SoK: Delegated Security in the Internet of Things. Future Internet, 17(5), 202. https://doi.org/10.3390/fi17050202

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop