{"title":"Adaptation of the DDS Security Standard for Resource-Constrained Sensor Networks","authors":"Kai Beckman, Jonas Reininger","doi":"10.1109/SIES.2018.8442103","DOIUrl":null,"url":null,"abstract":"Smart Home, Smart City and Smart Manufacturing are different application domains of the internet of things (IoT). To a certain degree they share the same architecture, technologies and protocols, and therefore, are facing the same challenges: guaranteeing security and privacy in hostile environments, dependability and especially availability at minimal cost based on limited resources. The threats are manifold, esp. wireless communication can be intercepted, messages can be modified, replayed or injected, nodes or parts of the network can be compromised. A Denial-of-Service (DoS) attack cannot only target the availability of the whole system but also be intended to exhaust the battery live of devices [1]. To counteract these threats in traditional IT systems and networks, established security methods are used based on symmetric and asymmetric cryptography and hashing.","PeriodicalId":236091,"journal":{"name":"2018 IEEE 13th International Symposium on Industrial Embedded Systems (SIES)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE 13th International Symposium on Industrial Embedded Systems (SIES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SIES.2018.8442103","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Smart Home, Smart City and Smart Manufacturing are different application domains of the internet of things (IoT). To a certain degree they share the same architecture, technologies and protocols, and therefore, are facing the same challenges: guaranteeing security and privacy in hostile environments, dependability and especially availability at minimal cost based on limited resources. The threats are manifold, esp. wireless communication can be intercepted, messages can be modified, replayed or injected, nodes or parts of the network can be compromised. A Denial-of-Service (DoS) attack cannot only target the availability of the whole system but also be intended to exhaust the battery live of devices [1]. To counteract these threats in traditional IT systems and networks, established security methods are used based on symmetric and asymmetric cryptography and hashing.