Valeria Lukaj, Francesco Martella, M. Fazio, A. Galletta, A. Celesti, M. Villari
{"title":"Gateway-Based Certification Approach to Include IoT Nodes in a Trusted Edge/Cloud Environment","authors":"Valeria Lukaj, Francesco Martella, M. Fazio, A. Galletta, A. Celesti, M. Villari","doi":"10.1109/CCGridW59191.2023.00048","DOIUrl":null,"url":null,"abstract":"Nowadays, Internet of Things (IoT) devices are gaining more and more popularity in several fields including smart cities and home automation. IoT devices are small components with limited functionalities, low costs and often low or missing security features. Therefore, hackers could use IoT devices to conduct attacks to digital systems based on IoT devices. A possible solution to solve such an issue is to employ Edge strategies for managing IoT devices. The advantage of using this approach is two folds. Firstly, unsecured devices are isolated from the trusted network. Secondly, IoT devices are certified and data signed. In this work, we propose a system for certifying IoT devices and verifying their identity. Experiments proved the goodness of the proposed approach.","PeriodicalId":341115,"journal":{"name":"2023 IEEE/ACM 23rd International Symposium on Cluster, Cloud and Internet Computing Workshops (CCGridW)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE/ACM 23rd International Symposium on Cluster, Cloud and Internet Computing Workshops (CCGridW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCGridW59191.2023.00048","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Nowadays, Internet of Things (IoT) devices are gaining more and more popularity in several fields including smart cities and home automation. IoT devices are small components with limited functionalities, low costs and often low or missing security features. Therefore, hackers could use IoT devices to conduct attacks to digital systems based on IoT devices. A possible solution to solve such an issue is to employ Edge strategies for managing IoT devices. The advantage of using this approach is two folds. Firstly, unsecured devices are isolated from the trusted network. Secondly, IoT devices are certified and data signed. In this work, we propose a system for certifying IoT devices and verifying their identity. Experiments proved the goodness of the proposed approach.