Edge Centric IoT Security

Edge Centric IoT Security

Part 1

Security is an important concept that could be examined from different angles. Although we expect IoT applications to have strong system security protections, securing IoT systems is still a challenge. As I studied before, There are some points of view to check out IoT security challenges such as User-Centric, Edge-Centric, Device-Centric. In this article, I’m going to investigate Edge-Centric IoT security.

There are many factors to overcome IoT security challenges such as recourse limitation and not enough secure design. In organization’s point of view there must be some secure mechanisms including advanced security algorithms which are following:

1-Attributed-base Access Control 2-Group Signature Authentication 3-Homomorphic Cryptography 4-Public Key-based solutions

IoT Devices Capability for Security Orchestration

These solutions demand ultra computing power and more memory space for devices to doing tasks and most of the time these aren’t suitable and capable of IoT end devices such as smart cameras, smart lockers, etc. in the contrast the cloud has unlimited resources but the cause of distance from end devices, providing the QoS for IoT end devices isn’t effective thus recently the edge-Centric security for IoT has been emphasized. This is a novel paradigm that improves IoT performance and would provide security solutions for end devices.

Edge Centric Architect of IoT

based on an article I have recently studied(Kewei Sha et.al ,”A Survey of edge computing-based designs for IoT security), The Edge-Centric IoT architecture contains four major parts: the cloud, the IoT end device, the edge and users. Users are the same IoT applications which lead us to easier life based on cloud/edge side services are provided to them. The end devices are embedded in physical section sense the world but they are not able to do powerful computing. The cloud has unlimited resources but are far from end devices thus are not cost effective for real-time applications. The edge if is the main center of IoT technology, the cost effective issue become lighter.

Design IoT Security based on Edge

The comprehensive design solutions in the edge layer include 3 parts: 1-User-Centric 2-Device-Centric 3-End-to-End security.

User-Centric: If IoT user got satisfied, It’s done 🙂 This is a known rule for being a success on IoT. By thousands of IoT connected devices on the internet scale, IoT applications take a chance to provide user access to a lot of resources with the terminals such as PCs, smartphones, and smart TVs. The most interesting property of IoT applications is pervasive availability to the resources. but in the security objective, two things must be considered. First: the user always may not use a secure and reliable device and second, ordinary users do not have efficient knowledge about security management.

Therefore the management of security for each user is not a bad idea and has some outcomes. 1-Design of personal security architecture 2-Virtualized security on the edge network. as the this link presents, when an individual user wants to access resources from different devices, first is connected to a Trusted Virtual Domain(TVD) in edge-side. then TVD handles secure access to IoT resources.

User-Centric edge-based IoT security architecture

I’ll talk more on the next post.

دیدگاهتان را بنویسید

نشانی ایمیل شما منتشر نخواهد شد. بخش‌های موردنیاز علامت‌گذاری شده‌اند *