2018
DOI: 10.1016/j.cose.2018.06.009
|View full text |Cite
|
Sign up to set email alerts
|

Tangible security: Survey of methods supporting secure ad-hoc connects of edge devices with physical context

Abstract: Edge computing is the concept of moving computation back to the endpoints of a network, as an alternative to, or in combination with, centralized, cloud-based architectures. It is especially of interest for Internet-of-Things and Cyber-Physical Systems where embedded endpoints make up the edge of the network, and where these devices need to make localised, time-critical decisions. In these environment secure, ad-hoc device-to-device interaction is important, but offers a challenge because devices might belong … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(12 citation statements)
references
References 75 publications
0
12
0
Order By: Relevance
“…This is summarised in Table III. The use of similar or exact technologies to guarantee security services for edge devices [52] and connectivity security aid in highlighting connectivity security as an extension of edge device security and supports the need to guarantee strong edge device security from the inception of an IIoT network. The extension of these implementing technologies also allows for load sharing of the security requirements between the two network areas while building in redundancies that could serve as backup protections in the event of a security breach.…”
Section: Secure Connectivity In the Iiotmentioning
confidence: 97%
“…This is summarised in Table III. The use of similar or exact technologies to guarantee security services for edge devices [52] and connectivity security aid in highlighting connectivity security as an extension of edge device security and supports the need to guarantee strong edge device security from the inception of an IIoT network. The extension of these implementing technologies also allows for load sharing of the security requirements between the two network areas while building in redundancies that could serve as backup protections in the event of a security breach.…”
Section: Secure Connectivity In the Iiotmentioning
confidence: 97%
“…As highlighted in Tab. I, some security solutions based on audio channels have been quickly touched in the recent literature by few surveys, focusing either on context-based security [8], [9], authentication solutions [10], side-channel attacks [11], CAPTCHAs [12] or forensic applications [13]. However, to the best of our knowledge, our contribution is the first to specifically survey, classify, and systematize security methods, applications, and use-cases using only short-range audio channels, as well as to evaluate such strategies across different use-cases and objectives, and to propose further research challenges-specific to this domain.…”
Section: Table I Overview Of Related Surveys and Their Respective Topicsmentioning
confidence: 99%
“…Paper Main Topic Addressed [8] Survey of the approaches supporting the pairing between devices leveraging the physical context shared by participating entities. [9] Survey of strategies used to establish the co-presence between communicating devices.…”
Section: Introductionmentioning
confidence: 99%
“…These devices also operate in mission critical environments with high availability requirements. Reliability, security, privacy and low latency are prioritised for large data exchange communications [28][29][30][31][32][33]. An investigation is thus required into the impact that the processor-intensive DLT operations could have on device operations.…”
Section: Related Work: Dlt-enabled Industrial Iot Solutionsmentioning
confidence: 99%