Nowadays, we are immersed in a digital world with a huge number of sensors, and devices, connected following a great variety of typologies. Internet Protocol (IP) v6 and the standardization of the novel Internet of Things (IoT) protocols enable new services and applications. Moreover, the heterogeneity of IP and non-IP devices requires novel security techniques, allowing non-IP devices to connect over a short range with a mediator gateway, and then forming a capillary access network. Providing security and privacy is hard in the conventional Internet, and is even more challenging in the IoT because of global connectivity and heterogeneous and resource-constrained devices. In this chapter, we present the background on security algorithms for both uni- and bidirectional terminals, in the context of IoT scenarios. We review the current security and privacy solutions in the IoT, and discuss research challenges for novel IoT security and privacy solutions. Particularly, we deal with security algorithms based on a local key renewal, performed considering only the local clock time. Finally, conclusive remarks and future trends are outlined at the end of the chapter.

Giuliano, R., Mazzenga, F., Neri, A., Vegni, A.m. (2016). Security protocols for iot access networks. In Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations (pp. 461-474). CRC Press.

Security protocols for iot access networks

Giuliano, Romeo;Mazzenga, Franco;
2016-01-01

Abstract

Nowadays, we are immersed in a digital world with a huge number of sensors, and devices, connected following a great variety of typologies. Internet Protocol (IP) v6 and the standardization of the novel Internet of Things (IoT) protocols enable new services and applications. Moreover, the heterogeneity of IP and non-IP devices requires novel security techniques, allowing non-IP devices to connect over a short range with a mediator gateway, and then forming a capillary access network. Providing security and privacy is hard in the conventional Internet, and is even more challenging in the IoT because of global connectivity and heterogeneous and resource-constrained devices. In this chapter, we present the background on security algorithms for both uni- and bidirectional terminals, in the context of IoT scenarios. We review the current security and privacy solutions in the IoT, and discuss research challenges for novel IoT security and privacy solutions. Particularly, we deal with security algorithms based on a local key renewal, performed considering only the local clock time. Finally, conclusive remarks and future trends are outlined at the end of the chapter.
2016
Settore ING-INF/03 - TELECOMUNICAZIONI
English
Rilevanza internazionale
Capitolo o saggio
Computer Science (all); Engineering (all); Physics and Astronomy (all)
https://www.crcpress.com/Security-and-Privacy-in-Internet-of-Things-IoTs-Models-Algorithms-and/Hu/p/book/9781498723183
Giuliano, R., Mazzenga, F., Neri, A., Vegni, A.m. (2016). Security protocols for iot access networks. In Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations (pp. 461-474). CRC Press.
Giuliano, R; Mazzenga, F; Neri, A; Vegni, Am
Contributo in libro
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2108/211631
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? ND
social impact