SoK : Delegated Security in the Internet of Things

dc.contributor.authorGeloczi, Emiliia
dc.contributor.authorKlement, Felix
dc.contributor.authorStruck, Patrick
dc.contributor.authorKatzenbeisser, Stefan
dc.date.accessioned2025-06-05T04:50:35Z
dc.date.available2025-06-05T04:50:35Z
dc.date.issued2025-04-30
dc.description.abstractThe increased use of electronic devices in the Internet of Things (IoT) leads not only to an improved comfort of living but also to an increased risk of attacks. IoT security has thus become an important research field. However, due to limits on performance and bandwidth, IoT devices are often not powerful enough to execute, e.g., costly cryptographic algorithms or protocols. This limitation can be solved through a delegation concept. By delegating certain operations to devices with sufficient resources, it is possible to achieve a high level of security without overloading a device that needs protection. In this paper, we give an overview of current approaches for security delegation in the context of IoT, formalise security notions, discuss the security of existing approaches, and identify further research questions. Furthermore, a mathematical formalisation of the CIA triad (confidentiality, integrity, and availability) is proposed for the predefined application areas, in order to evaluate the different approaches.
dc.description.versionpublisheddeu
dc.identifier.doi10.3390/fi17050202
dc.identifier.ppn1927588251
dc.identifier.urihttps://kops.uni-konstanz.de/handle/123456789/73506
dc.language.isoeng
dc.rightsAttribution 4.0 International
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/
dc.subjectInternet of Things
dc.subjectdelegation
dc.subjectsecurity
dc.subjectaccess control
dc.subjectauthorisation
dc.subjectcomputation
dc.subjectauthentication
dc.subject.ddc004
dc.titleSoK : Delegated Security in the Internet of Thingseng
dc.typeJOURNAL_ARTICLE
dspace.entity.typePublication
kops.citation.bibtex
@article{Geloczi2025-04-30Deleg-73506,
  title={SoK : Delegated Security in the Internet of Things},
  year={2025},
  doi={10.3390/fi17050202},
  number={5},
  volume={17},
  journal={Future Internet},
  author={Geloczi, Emiliia and Klement, Felix and Struck, Patrick and Katzenbeisser, Stefan},
  note={Article Number: 202}
}
kops.citation.iso690GELOCZI, Emiliia, Felix KLEMENT, Patrick STRUCK, Stefan KATZENBEISSER, 2025. SoK : Delegated Security in the Internet of Things. In: Future Internet. MDPI. 2025, 17(5), 202. eISSN 1999-5903. Verfügbar unter: doi: 10.3390/fi17050202deu
kops.citation.iso690GELOCZI, Emiliia, Felix KLEMENT, Patrick STRUCK, Stefan KATZENBEISSER, 2025. SoK : Delegated Security in the Internet of Things. In: Future Internet. MDPI. 2025, 17(5), 202. eISSN 1999-5903. Available under: doi: 10.3390/fi17050202eng
kops.citation.rdf
<rdf:RDF
    xmlns:dcterms="http://purl.org/dc/terms/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:bibo="http://purl.org/ontology/bibo/"
    xmlns:dspace="http://digital-repositories.org/ontologies/dspace/0.1.0#"
    xmlns:foaf="http://xmlns.com/foaf/0.1/"
    xmlns:void="http://rdfs.org/ns/void#"
    xmlns:xsd="http://www.w3.org/2001/XMLSchema#" > 
  <rdf:Description rdf:about="https://kops.uni-konstanz.de/server/rdf/resource/123456789/73506">
    <dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2025-06-05T04:50:35Z</dc:date>
    <dc:contributor>Struck, Patrick</dc:contributor>
    <dcterms:rights rdf:resource="http://creativecommons.org/licenses/by/4.0/"/>
    <dc:contributor>Katzenbeisser, Stefan</dc:contributor>
    <dc:creator>Katzenbeisser, Stefan</dc:creator>
    <dc:contributor>Klement, Felix</dc:contributor>
    <dc:creator>Klement, Felix</dc:creator>
    <void:sparqlEndpoint rdf:resource="http://localhost/fuseki/dspace/sparql"/>
    <dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
    <bibo:uri rdf:resource="https://kops.uni-konstanz.de/handle/123456789/73506"/>
    <dcterms:abstract>The increased use of electronic devices in the Internet of Things (IoT) leads not only to an improved comfort of living but also to an increased risk of attacks. IoT security has thus become an important research field. However, due to limits on performance and bandwidth, IoT devices are often not powerful enough to execute, e.g., costly cryptographic algorithms or protocols. This limitation can be solved through a delegation concept. By delegating certain operations to devices with sufficient resources, it is possible to achieve a high level of security without overloading a device that needs protection. In this paper, we give an overview of current approaches for security delegation in the context of IoT, formalise security notions, discuss the security of existing approaches, and identify further research questions. Furthermore, a mathematical formalisation of the CIA triad (confidentiality, integrity, and availability) is proposed for the predefined application areas, in order to evaluate the different approaches.</dcterms:abstract>
    <dspace:hasBitstream rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/73506/1/Geloczi_2-fcr4k605tsc60.pdf"/>
    <foaf:homepage rdf:resource="http://localhost:8080/"/>
    <dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2025-06-05T04:50:35Z</dcterms:available>
    <dc:language>eng</dc:language>
    <dcterms:hasPart rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/73506/1/Geloczi_2-fcr4k605tsc60.pdf"/>
    <dcterms:title>SoK : Delegated Security in the Internet of Things</dcterms:title>
    <dc:creator>Struck, Patrick</dc:creator>
    <dc:contributor>Geloczi, Emiliia</dc:contributor>
    <dcterms:issued>2025-04-30</dcterms:issued>
    <dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
    <dc:creator>Geloczi, Emiliia</dc:creator>
    <dc:rights>Attribution 4.0 International</dc:rights>
  </rdf:Description>
</rdf:RDF>
kops.description.openAccessopenaccessgold
kops.flag.isPeerReviewedtrue
kops.flag.knbibliographytrue
kops.identifier.nbnurn:nbn:de:bsz:352-2-fcr4k605tsc60
kops.sourcefieldFuture Internet. MDPI. 2025, <b>17</b>(5), 202. eISSN 1999-5903. Verfügbar unter: doi: 10.3390/fi17050202deu
kops.sourcefield.plainFuture Internet. MDPI. 2025, 17(5), 202. eISSN 1999-5903. Verfügbar unter: doi: 10.3390/fi17050202deu
kops.sourcefield.plainFuture Internet. MDPI. 2025, 17(5), 202. eISSN 1999-5903. Available under: doi: 10.3390/fi17050202eng
relation.isAuthorOfPublication56d3cbd4-d902-478d-aba1-2d3d478b8ea8
relation.isAuthorOfPublication.latestForDiscovery56d3cbd4-d902-478d-aba1-2d3d478b8ea8
source.bibliographicInfo.articleNumber202
source.bibliographicInfo.issue5
source.bibliographicInfo.volume17
source.identifier.eissn1999-5903
source.periodicalTitleFuture Internet
source.publisherMDPI

Dateien

Originalbündel

Gerade angezeigt 1 - 1 von 1
Vorschaubild nicht verfügbar
Name:
Geloczi_2-fcr4k605tsc60.pdf
Größe:
2.09 MB
Format:
Adobe Portable Document Format
Geloczi_2-fcr4k605tsc60.pdf
Geloczi_2-fcr4k605tsc60.pdfGröße: 2.09 MBDownloads: 205