Resource constrained IOT environments: A survey

G. C. Madhu, P. Vijayakumar, Xiao Zhi Gao

Research output: Contribution to journalArticleScientificpeer-review

2 Citations (Scopus)

Abstract

Internet of Things (IoT) is a transformative approach of interconnecting many heterogeneous entities that are embedded with the capabilities of sensing, computing and communication. These entities are characterized by small size, less computation power, little memory and limited battery. The presence of large heterogeneity and openness introduces many security breaches. To provide security for these constrained devices, traditional cryptographic primitives and strategies are not suitable. This paper presents a review on research advances related to the security aspects of the Resource constrained IoT environments. In this paper, Architecture of the IoT and its Applications are first discussed. Secondly, classification of the constrained devices is defined. Thirdly, Security objectives in terms of confidentiality, Authentication and integrity are discussed. Later, recently proposed security approaches suited for the constrained environments are discussed. Finally, the hardware and software platforms needed for IoT realization are discussed.

Original languageEnglish
Pages (from-to)445-457
Number of pages13
JournalJournal of Advanced Research in Dynamical and Control Systems
Volume9
Issue numberSpecial Issue 16
Publication statusPublished - 1 Jan 2017
MoE publication typeA1 Journal article-refereed

Keywords

  • Constrained devices
  • Elliptical curve cryptography
  • Internet of things
  • Lightweight cryptography
  • Security

Fingerprint

Dive into the research topics of 'Resource constrained IOT environments: A survey'. Together they form a unique fingerprint.

Cite this