Valeria Lukaj, Francesco Martella, M. Fazio, A. Galletta, A. Celesti, M. Villari
{"title":"基于网关的认证方法将物联网节点包含在可信边缘/云环境中","authors":"Valeria Lukaj, Francesco Martella, M. Fazio, A. Galletta, A. Celesti, M. Villari","doi":"10.1109/CCGridW59191.2023.00048","DOIUrl":null,"url":null,"abstract":"Nowadays, Internet of Things (IoT) devices are gaining more and more popularity in several fields including smart cities and home automation. IoT devices are small components with limited functionalities, low costs and often low or missing security features. Therefore, hackers could use IoT devices to conduct attacks to digital systems based on IoT devices. A possible solution to solve such an issue is to employ Edge strategies for managing IoT devices. The advantage of using this approach is two folds. Firstly, unsecured devices are isolated from the trusted network. Secondly, IoT devices are certified and data signed. In this work, we propose a system for certifying IoT devices and verifying their identity. Experiments proved the goodness of the proposed approach.","PeriodicalId":341115,"journal":{"name":"2023 IEEE/ACM 23rd International Symposium on Cluster, Cloud and Internet Computing Workshops (CCGridW)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Gateway-Based Certification Approach to Include IoT Nodes in a Trusted Edge/Cloud Environment\",\"authors\":\"Valeria Lukaj, Francesco Martella, M. Fazio, A. Galletta, A. Celesti, M. Villari\",\"doi\":\"10.1109/CCGridW59191.2023.00048\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays, Internet of Things (IoT) devices are gaining more and more popularity in several fields including smart cities and home automation. IoT devices are small components with limited functionalities, low costs and often low or missing security features. Therefore, hackers could use IoT devices to conduct attacks to digital systems based on IoT devices. A possible solution to solve such an issue is to employ Edge strategies for managing IoT devices. The advantage of using this approach is two folds. Firstly, unsecured devices are isolated from the trusted network. Secondly, IoT devices are certified and data signed. In this work, we propose a system for certifying IoT devices and verifying their identity. Experiments proved the goodness of the proposed approach.\",\"PeriodicalId\":341115,\"journal\":{\"name\":\"2023 IEEE/ACM 23rd International Symposium on Cluster, Cloud and Internet Computing Workshops (CCGridW)\",\"volume\":\"27 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 IEEE/ACM 23rd International Symposium on Cluster, Cloud and Internet Computing Workshops (CCGridW)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCGridW59191.2023.00048\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE/ACM 23rd International Symposium on Cluster, Cloud and Internet Computing Workshops (CCGridW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCGridW59191.2023.00048","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Gateway-Based Certification Approach to Include IoT Nodes in a Trusted Edge/Cloud Environment
Nowadays, Internet of Things (IoT) devices are gaining more and more popularity in several fields including smart cities and home automation. IoT devices are small components with limited functionalities, low costs and often low or missing security features. Therefore, hackers could use IoT devices to conduct attacks to digital systems based on IoT devices. A possible solution to solve such an issue is to employ Edge strategies for managing IoT devices. The advantage of using this approach is two folds. Firstly, unsecured devices are isolated from the trusted network. Secondly, IoT devices are certified and data signed. In this work, we propose a system for certifying IoT devices and verifying their identity. Experiments proved the goodness of the proposed approach.