2019
DOI: 10.1007/s11227-019-03021-2
|View full text |Cite
|
Sign up to set email alerts
|

A context-aware encryption protocol suite for edge computing-based IoT devices

Abstract: Heterogeneous devices are connected with each other through wireless links within a Cyber Physical System. These devices undergo resource constraints such as battery, bandwidth, memory, and computing power. Moreover, the massive interconnections of these devices result in network latency and reduced speed. Edge computing offers a solution to this problem in which devices transmit the preprocessed actionable data in a formal way resulting in reduced data traffic and improved speed. However, to provide the same … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 17 publications
(17 citation statements)
references
References 49 publications
0
17
0
Order By: Relevance
“…This proposed method improves the utilization of links and also incorporate more GTS nodes. In [23], the authors propose an encryption protocol based on context awareness for IoT network which selects the best encryption protocol based on data confidentiality and device specifications. This method saved memory consumption by 79%, battery consumption by 56% and reduced execution time by 68%.…”
Section: Literature Surveymentioning
confidence: 99%
“…This proposed method improves the utilization of links and also incorporate more GTS nodes. In [23], the authors propose an encryption protocol based on context awareness for IoT network which selects the best encryption protocol based on data confidentiality and device specifications. This method saved memory consumption by 79%, battery consumption by 56% and reduced execution time by 68%.…”
Section: Literature Surveymentioning
confidence: 99%
“…Confidentiality is a significant hindrance for mobile users that wish to utilise mobile apps and services. The MEC paradigm introduces limitations affecting data confidentiality [21], [65], [66]. As the data is transmitted and received within shared and sometimes public networks and stored or processed in distributed and shared edge networks, the likelihood of unauthorised access to sensitive data by service providers is relatively high [12], [23], [34], [35].…”
Section: ) Data Confidentialitymentioning
confidence: 99%
“…The ITU-T defines privacy [17] as the right of individuals to control what information related to them may be collected, analysed and stored and by whom and to whom that information may be revealed. By extension, privacy is also associated with specific technical means such as cryptography [61], [66]. Privacy mechanism will ensure information is not disclosed to any party other than the intended parties so that only the explicitly authorised parties can interpret the content being exchanged.…”
Section: Security Threat Challengesmentioning
confidence: 99%
“…For example, Zhao et al [20] proposed an efficient scheduling scheme for cloud resources to satisfy the QoS for Analytics as a Service (AaaS) alongside minimizing the energy consumption of DCs. A context-aware approach was proposed by Dar et al [21] to categorize the data and device according to their confidentiality level to minimize the energy consumption at different levels. Alqahtani et al [22] proposed a greedy heuristic approach to assign the computing resources at the edge level in order to process the tasks with minimal energy consumption.…”
Section: Related Workmentioning
confidence: 99%