Publikation: SoK : Delegated Security in the Internet of Things
Dateien
Datum
Autor:innen
Herausgeber:innen
ISSN der Zeitschrift
Electronic ISSN
ISBN
Bibliografische Daten
Verlag
Schriftenreihe
Auflagebezeichnung
URI (zitierfähiger Link)
DOI (zitierfähiger Link)
Internationale Patentnummer
Link zur Lizenz
Angaben zur Forschungsförderung
Projekt
Open Access-Veröffentlichung
Core Facility der Universität Konstanz
Titel in einer weiteren Sprache
Publikationstyp
Publikationsstatus
Erschienen in
Zusammenfassung
The increased use of electronic devices in the Internet of Things (IoT) leads not only to an improved comfort of living but also to an increased risk of attacks. IoT security has thus become an important research field. However, due to limits on performance and bandwidth, IoT devices are often not powerful enough to execute, e.g., costly cryptographic algorithms or protocols. This limitation can be solved through a delegation concept. By delegating certain operations to devices with sufficient resources, it is possible to achieve a high level of security without overloading a device that needs protection. In this paper, we give an overview of current approaches for security delegation in the context of IoT, formalise security notions, discuss the security of existing approaches, and identify further research questions. Furthermore, a mathematical formalisation of the CIA triad (confidentiality, integrity, and availability) is proposed for the predefined application areas, in order to evaluate the different approaches.
Zusammenfassung in einer weiteren Sprache
Fachgebiet (DDC)
Schlagwörter
Konferenz
Rezension
Zitieren
ISO 690
GELOCZI, Emiliia, Felix KLEMENT, Patrick STRUCK, Stefan KATZENBEISSER, 2025. SoK : Delegated Security in the Internet of Things. In: Future Internet. MDPI. 2025, 17(5), 202. eISSN 1999-5903. Verfügbar unter: doi: 10.3390/fi17050202BibTex
@article{Geloczi2025-04-30Deleg-73506, title={SoK : Delegated Security in the Internet of Things}, year={2025}, doi={10.3390/fi17050202}, number={5}, volume={17}, journal={Future Internet}, author={Geloczi, Emiliia and Klement, Felix and Struck, Patrick and Katzenbeisser, Stefan}, note={Article Number: 202} }
RDF
<rdf:RDF xmlns:dcterms="http://purl.org/dc/terms/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:bibo="http://purl.org/ontology/bibo/" xmlns:dspace="http://digital-repositories.org/ontologies/dspace/0.1.0#" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:void="http://rdfs.org/ns/void#" xmlns:xsd="http://www.w3.org/2001/XMLSchema#" > <rdf:Description rdf:about="https://kops.uni-konstanz.de/server/rdf/resource/123456789/73506"> <dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2025-06-05T04:50:35Z</dc:date> <dc:contributor>Struck, Patrick</dc:contributor> <dcterms:rights rdf:resource="http://creativecommons.org/licenses/by/4.0/"/> <dc:contributor>Katzenbeisser, Stefan</dc:contributor> <dc:creator>Katzenbeisser, Stefan</dc:creator> <dc:contributor>Klement, Felix</dc:contributor> <dc:creator>Klement, Felix</dc:creator> <void:sparqlEndpoint rdf:resource="http://localhost/fuseki/dspace/sparql"/> <dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/> <bibo:uri rdf:resource="https://kops.uni-konstanz.de/handle/123456789/73506"/> <dcterms:abstract>The increased use of electronic devices in the Internet of Things (IoT) leads not only to an improved comfort of living but also to an increased risk of attacks. IoT security has thus become an important research field. However, due to limits on performance and bandwidth, IoT devices are often not powerful enough to execute, e.g., costly cryptographic algorithms or protocols. This limitation can be solved through a delegation concept. By delegating certain operations to devices with sufficient resources, it is possible to achieve a high level of security without overloading a device that needs protection. In this paper, we give an overview of current approaches for security delegation in the context of IoT, formalise security notions, discuss the security of existing approaches, and identify further research questions. Furthermore, a mathematical formalisation of the CIA triad (confidentiality, integrity, and availability) is proposed for the predefined application areas, in order to evaluate the different approaches.</dcterms:abstract> <dspace:hasBitstream rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/73506/1/Geloczi_2-fcr4k605tsc60.pdf"/> <foaf:homepage rdf:resource="http://localhost:8080/"/> <dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2025-06-05T04:50:35Z</dcterms:available> <dc:language>eng</dc:language> <dcterms:hasPart rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/73506/1/Geloczi_2-fcr4k605tsc60.pdf"/> <dcterms:title>SoK : Delegated Security in the Internet of Things</dcterms:title> <dc:creator>Struck, Patrick</dc:creator> <dc:contributor>Geloczi, Emiliia</dc:contributor> <dcterms:issued>2025-04-30</dcterms:issued> <dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/> <dc:creator>Geloczi, Emiliia</dc:creator> <dc:rights>Attribution 4.0 International</dc:rights> </rdf:Description> </rdf:RDF>