2015
DOI: 10.1109/msp.2015.7
|View full text |Cite
|
Sign up to set email alerts
|

Low-Energy Security: Limits and Opportunities in the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
99
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 228 publications
(99 citation statements)
references
References 13 publications
0
99
0
Order By: Relevance
“…Trappe et al [9] introduced the issue of IoT imperatives, and their consequences for utilizing current cryptographic apparatuses as the ones used in customary Web. The two primary restrictions are the battery limit and registering power.…”
Section: Iot Device Limitationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Trappe et al [9] introduced the issue of IoT imperatives, and their consequences for utilizing current cryptographic apparatuses as the ones used in customary Web. The two primary restrictions are the battery limit and registering power.…”
Section: Iot Device Limitationsmentioning
confidence: 99%
“…The paper [9] specified that traditional cryptography can't take a shot at IoT frameworks, since the gadgets have restricted memory space which can't deal with the figuring and capacity prerequisites of cutting edge cryptography calculations. To help security systems for the compelled gadgets, the creators proposed reusing existing capacities.…”
Section: B Lightweight Computationmentioning
confidence: 99%
“…Trappe et al showed that the power constraint in IoT edge devices limits the encryption/encoding functionality of the sensor nodes which leads to poorly encrypted communication or no encryption at all [87]. In a study, HP revealed that almost 70% of IoT devices they tested did not encrypt communications to the Internet and the local network, while half of the device's mobile applications performed unencrypted communications with the cloud, the Internet, and local network [73].…”
Section: Limitations and Challengesmentioning
confidence: 99%
“…Consequently, when the sensors are deployed in the field, they are expected to operate uninterrupted for a long period of time. In order to support large scale adoption, these sensors are severely budget constrained which in turn result in the integration of small batteries, low end processors and very limited memories in IoT/CPS sensor-based edge devices [87]. Operating on a small battery for a long period of time presents some unique design challenges which have forced the designers to consider energy harvesting from the nature, operating the devices in low energy sleep state majority of the time, and avoiding energy intensive cryptographic computations.…”
Section: Resource Constraintsmentioning
confidence: 99%
“…There has been research on IoT devices such as Bluetooth low Energy (BLE) sensor module [10] and power consumption issues on IoT devices [11]. EZ [12] is a gateway that supports an efficient asynchronous protocol in IoT.…”
Section: Related Workmentioning
confidence: 99%