SoK : Delegated Security in the Internet of Things
| dc.contributor.author | Geloczi, Emiliia | |
| dc.contributor.author | Klement, Felix | |
| dc.contributor.author | Struck, Patrick | |
| dc.contributor.author | Katzenbeisser, Stefan | |
| dc.date.accessioned | 2025-06-05T04:50:35Z | |
| dc.date.available | 2025-06-05T04:50:35Z | |
| dc.date.issued | 2025-04-30 | |
| dc.description.abstract | The increased use of electronic devices in the Internet of Things (IoT) leads not only to an improved comfort of living but also to an increased risk of attacks. IoT security has thus become an important research field. However, due to limits on performance and bandwidth, IoT devices are often not powerful enough to execute, e.g., costly cryptographic algorithms or protocols. This limitation can be solved through a delegation concept. By delegating certain operations to devices with sufficient resources, it is possible to achieve a high level of security without overloading a device that needs protection. In this paper, we give an overview of current approaches for security delegation in the context of IoT, formalise security notions, discuss the security of existing approaches, and identify further research questions. Furthermore, a mathematical formalisation of the CIA triad (confidentiality, integrity, and availability) is proposed for the predefined application areas, in order to evaluate the different approaches. | |
| dc.description.version | published | deu |
| dc.identifier.doi | 10.3390/fi17050202 | |
| dc.identifier.ppn | 1927588251 | |
| dc.identifier.uri | https://kops.uni-konstanz.de/handle/123456789/73506 | |
| dc.language.iso | eng | |
| dc.rights | Attribution 4.0 International | |
| dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | |
| dc.subject | Internet of Things | |
| dc.subject | delegation | |
| dc.subject | security | |
| dc.subject | access control | |
| dc.subject | authorisation | |
| dc.subject | computation | |
| dc.subject | authentication | |
| dc.subject.ddc | 004 | |
| dc.title | SoK : Delegated Security in the Internet of Things | eng |
| dc.type | JOURNAL_ARTICLE | |
| dspace.entity.type | Publication | |
| kops.citation.bibtex | @article{Geloczi2025-04-30Deleg-73506,
title={SoK : Delegated Security in the Internet of Things},
year={2025},
doi={10.3390/fi17050202},
number={5},
volume={17},
journal={Future Internet},
author={Geloczi, Emiliia and Klement, Felix and Struck, Patrick and Katzenbeisser, Stefan},
note={Article Number: 202}
} | |
| kops.citation.iso690 | GELOCZI, Emiliia, Felix KLEMENT, Patrick STRUCK, Stefan KATZENBEISSER, 2025. SoK : Delegated Security in the Internet of Things. In: Future Internet. MDPI. 2025, 17(5), 202. eISSN 1999-5903. Verfügbar unter: doi: 10.3390/fi17050202 | deu |
| kops.citation.iso690 | GELOCZI, Emiliia, Felix KLEMENT, Patrick STRUCK, Stefan KATZENBEISSER, 2025. SoK : Delegated Security in the Internet of Things. In: Future Internet. MDPI. 2025, 17(5), 202. eISSN 1999-5903. Available under: doi: 10.3390/fi17050202 | eng |
| kops.citation.rdf | <rdf:RDF
xmlns:dcterms="http://purl.org/dc/terms/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
xmlns:bibo="http://purl.org/ontology/bibo/"
xmlns:dspace="http://digital-repositories.org/ontologies/dspace/0.1.0#"
xmlns:foaf="http://xmlns.com/foaf/0.1/"
xmlns:void="http://rdfs.org/ns/void#"
xmlns:xsd="http://www.w3.org/2001/XMLSchema#" >
<rdf:Description rdf:about="https://kops.uni-konstanz.de/server/rdf/resource/123456789/73506">
<dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2025-06-05T04:50:35Z</dc:date>
<dc:contributor>Struck, Patrick</dc:contributor>
<dcterms:rights rdf:resource="http://creativecommons.org/licenses/by/4.0/"/>
<dc:contributor>Katzenbeisser, Stefan</dc:contributor>
<dc:creator>Katzenbeisser, Stefan</dc:creator>
<dc:contributor>Klement, Felix</dc:contributor>
<dc:creator>Klement, Felix</dc:creator>
<void:sparqlEndpoint rdf:resource="http://localhost/fuseki/dspace/sparql"/>
<dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
<bibo:uri rdf:resource="https://kops.uni-konstanz.de/handle/123456789/73506"/>
<dcterms:abstract>The increased use of electronic devices in the Internet of Things (IoT) leads not only to an improved comfort of living but also to an increased risk of attacks. IoT security has thus become an important research field. However, due to limits on performance and bandwidth, IoT devices are often not powerful enough to execute, e.g., costly cryptographic algorithms or protocols. This limitation can be solved through a delegation concept. By delegating certain operations to devices with sufficient resources, it is possible to achieve a high level of security without overloading a device that needs protection. In this paper, we give an overview of current approaches for security delegation in the context of IoT, formalise security notions, discuss the security of existing approaches, and identify further research questions. Furthermore, a mathematical formalisation of the CIA triad (confidentiality, integrity, and availability) is proposed for the predefined application areas, in order to evaluate the different approaches.</dcterms:abstract>
<dspace:hasBitstream rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/73506/1/Geloczi_2-fcr4k605tsc60.pdf"/>
<foaf:homepage rdf:resource="http://localhost:8080/"/>
<dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2025-06-05T04:50:35Z</dcterms:available>
<dc:language>eng</dc:language>
<dcterms:hasPart rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/73506/1/Geloczi_2-fcr4k605tsc60.pdf"/>
<dcterms:title>SoK : Delegated Security in the Internet of Things</dcterms:title>
<dc:creator>Struck, Patrick</dc:creator>
<dc:contributor>Geloczi, Emiliia</dc:contributor>
<dcterms:issued>2025-04-30</dcterms:issued>
<dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
<dc:creator>Geloczi, Emiliia</dc:creator>
<dc:rights>Attribution 4.0 International</dc:rights>
</rdf:Description>
</rdf:RDF> | |
| kops.description.openAccess | openaccessgold | |
| kops.flag.isPeerReviewed | true | |
| kops.flag.knbibliography | true | |
| kops.identifier.nbn | urn:nbn:de:bsz:352-2-fcr4k605tsc60 | |
| kops.sourcefield | Future Internet. MDPI. 2025, <b>17</b>(5), 202. eISSN 1999-5903. Verfügbar unter: doi: 10.3390/fi17050202 | deu |
| kops.sourcefield.plain | Future Internet. MDPI. 2025, 17(5), 202. eISSN 1999-5903. Verfügbar unter: doi: 10.3390/fi17050202 | deu |
| kops.sourcefield.plain | Future Internet. MDPI. 2025, 17(5), 202. eISSN 1999-5903. Available under: doi: 10.3390/fi17050202 | eng |
| relation.isAuthorOfPublication | 56d3cbd4-d902-478d-aba1-2d3d478b8ea8 | |
| relation.isAuthorOfPublication.latestForDiscovery | 56d3cbd4-d902-478d-aba1-2d3d478b8ea8 | |
| source.bibliographicInfo.articleNumber | 202 | |
| source.bibliographicInfo.issue | 5 | |
| source.bibliographicInfo.volume | 17 | |
| source.identifier.eissn | 1999-5903 | |
| source.periodicalTitle | Future Internet | |
| source.publisher | MDPI |
Dateien
Originalbündel
1 - 1 von 1
Vorschaubild nicht verfügbar
- Name:
- Geloczi_2-fcr4k605tsc60.pdf
- Größe:
- 2.09 MB
- Format:
- Adobe Portable Document Format
