Publikation:

SoK : Delegated Security in the Internet of Things

Lade...
Vorschaubild

Dateien

Geloczi_2-fcr4k605tsc60.pdf
Geloczi_2-fcr4k605tsc60.pdfGröße: 2.09 MBDownloads: 10

Datum

2025

Autor:innen

Geloczi, Emiliia
Klement, Felix
Katzenbeisser, Stefan

Herausgeber:innen

Kontakt

ISSN der Zeitschrift

Electronic ISSN

ISBN

Bibliografische Daten

Verlag

Schriftenreihe

Auflagebezeichnung

DOI (zitierfähiger Link)
ArXiv-ID

Internationale Patentnummer

Link zur Lizenz

Angaben zur Forschungsförderung

Projekt

Open Access-Veröffentlichung
Open Access Gold
Core Facility der Universität Konstanz

Gesperrt bis

Titel in einer weiteren Sprache

Publikationstyp
Zeitschriftenartikel
Publikationsstatus
Published

Erschienen in

Future Internet. MDPI. 2025, 17(5), 202. eISSN 1999-5903. Verfügbar unter: doi: 10.3390/fi17050202

Zusammenfassung

The increased use of electronic devices in the Internet of Things (IoT) leads not only to an improved comfort of living but also to an increased risk of attacks. IoT security has thus become an important research field. However, due to limits on performance and bandwidth, IoT devices are often not powerful enough to execute, e.g., costly cryptographic algorithms or protocols. This limitation can be solved through a delegation concept. By delegating certain operations to devices with sufficient resources, it is possible to achieve a high level of security without overloading a device that needs protection. In this paper, we give an overview of current approaches for security delegation in the context of IoT, formalise security notions, discuss the security of existing approaches, and identify further research questions. Furthermore, a mathematical formalisation of the CIA triad (confidentiality, integrity, and availability) is proposed for the predefined application areas, in order to evaluate the different approaches.

Zusammenfassung in einer weiteren Sprache

Fachgebiet (DDC)
004 Informatik

Schlagwörter

Internet of Things, delegation, security, access control, authorisation, computation, authentication

Konferenz

Rezension
undefined / . - undefined, undefined

Forschungsvorhaben

Organisationseinheiten

Zeitschriftenheft

Zugehörige Datensätze in KOPS

Zitieren

ISO 690GELOCZI, Emiliia, Felix KLEMENT, Patrick STRUCK, Stefan KATZENBEISSER, 2025. SoK : Delegated Security in the Internet of Things. In: Future Internet. MDPI. 2025, 17(5), 202. eISSN 1999-5903. Verfügbar unter: doi: 10.3390/fi17050202
BibTex
@article{Geloczi2025-04-30Deleg-73506,
  title={SoK : Delegated Security in the Internet of Things},
  year={2025},
  doi={10.3390/fi17050202},
  number={5},
  volume={17},
  journal={Future Internet},
  author={Geloczi, Emiliia and Klement, Felix and Struck, Patrick and Katzenbeisser, Stefan},
  note={Article Number: 202}
}
RDF
<rdf:RDF
    xmlns:dcterms="http://purl.org/dc/terms/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:bibo="http://purl.org/ontology/bibo/"
    xmlns:dspace="http://digital-repositories.org/ontologies/dspace/0.1.0#"
    xmlns:foaf="http://xmlns.com/foaf/0.1/"
    xmlns:void="http://rdfs.org/ns/void#"
    xmlns:xsd="http://www.w3.org/2001/XMLSchema#" > 
  <rdf:Description rdf:about="https://kops.uni-konstanz.de/server/rdf/resource/123456789/73506">
    <dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2025-06-05T04:50:35Z</dc:date>
    <dc:contributor>Struck, Patrick</dc:contributor>
    <dcterms:rights rdf:resource="http://creativecommons.org/licenses/by/4.0/"/>
    <dc:contributor>Katzenbeisser, Stefan</dc:contributor>
    <dc:creator>Katzenbeisser, Stefan</dc:creator>
    <dc:contributor>Klement, Felix</dc:contributor>
    <dc:creator>Klement, Felix</dc:creator>
    <void:sparqlEndpoint rdf:resource="http://localhost/fuseki/dspace/sparql"/>
    <dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
    <bibo:uri rdf:resource="https://kops.uni-konstanz.de/handle/123456789/73506"/>
    <dcterms:abstract>The increased use of electronic devices in the Internet of Things (IoT) leads not only to an improved comfort of living but also to an increased risk of attacks. IoT security has thus become an important research field. However, due to limits on performance and bandwidth, IoT devices are often not powerful enough to execute, e.g., costly cryptographic algorithms or protocols. This limitation can be solved through a delegation concept. By delegating certain operations to devices with sufficient resources, it is possible to achieve a high level of security without overloading a device that needs protection. In this paper, we give an overview of current approaches for security delegation in the context of IoT, formalise security notions, discuss the security of existing approaches, and identify further research questions. Furthermore, a mathematical formalisation of the CIA triad (confidentiality, integrity, and availability) is proposed for the predefined application areas, in order to evaluate the different approaches.</dcterms:abstract>
    <dspace:hasBitstream rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/73506/1/Geloczi_2-fcr4k605tsc60.pdf"/>
    <foaf:homepage rdf:resource="http://localhost:8080/"/>
    <dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2025-06-05T04:50:35Z</dcterms:available>
    <dc:language>eng</dc:language>
    <dcterms:hasPart rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/73506/1/Geloczi_2-fcr4k605tsc60.pdf"/>
    <dcterms:title>SoK : Delegated Security in the Internet of Things</dcterms:title>
    <dc:creator>Struck, Patrick</dc:creator>
    <dc:contributor>Geloczi, Emiliia</dc:contributor>
    <dcterms:issued>2025-04-30</dcterms:issued>
    <dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
    <dc:creator>Geloczi, Emiliia</dc:creator>
    <dc:rights>Attribution 4.0 International</dc:rights>
  </rdf:Description>
</rdf:RDF>

Interner Vermerk

xmlui.Submission.submit.DescribeStep.inputForms.label.kops_note_fromSubmitter

Kontakt
URL der Originalveröffentl.

Prüfdatum der URL

Prüfungsdatum der Dissertation

Finanzierungsart

Kommentar zur Publikation

Allianzlizenz
Corresponding Authors der Uni Konstanz vorhanden
Internationale Co-Autor:innen
Universitätsbibliographie
Ja
Begutachtet
Ja
Diese Publikation teilen