首页> 外文期刊>Wireless Communications Letters, IEEE >Security and Privacy in the Internet-of-Things Under Time-and-Budget-Limited Adversary Model
【24h】

Security and Privacy in the Internet-of-Things Under Time-and-Budget-Limited Adversary Model

机译:时间和预算受限的对手模型下物联网的安全性和隐私性

获取原文
获取原文并翻译 | 示例
           

摘要

Internet-of-Things (IoT) represents an emerging era of networking that connects a variety of common appliances to one another, as well as with the rest of the Internet, to vastly improve our lives. Despite being significantly resource-constrained, IoT nodes are expected to participate in numerous computationally-intensive security protocols to overcome threats from the public Internet. Given that IoT nodes (e.g., smart meters) typically exchange tactical data that requires data protection for a short time span of up to a few days, we examine the use of smaller cryptographic key sizes to provide IoT security. We show that small key sizes quite drastically reduce the cryptographic computational processing requirements for IoT nodes. We estimate the cost of breaking public key crypto systems when the adversary is limited by the available resources (i.e., dollar ) and time (i.e., ). We consider Moore's law, as well as , and technology growth rates, in conjunction with the capabilities of a real-world key-breaker to calculate the cost estimates. Finally, we also present the trade-off between the processing load for an IoT node versus the desired time span of privacy protection.
机译:物联网(IoT)代表了一个新兴的网络时代,该时代将各种通用设备以及互联网的其余部分相互连接起来,以极大地改善我们的生活。尽管资源受到严重限制,但物联网节点仍有望参与众多计算密集型安全协议,以克服来自公共互联网的威胁。鉴于IoT节点(例如,智能电表)通常会交换战术数据,这些战术数据需要长达几天的短时间保护,因此我们将研究使用较小的加密密钥大小来提供IoT安全性。我们显示,较小的密钥大小极大地降低了IoT节点的密码计算处理要求。当对手受到可用资源(即美元)和时间(即)限制时,我们估计破坏公钥密码系统的成本。我们考虑了摩尔定律,以及技术增长率,以及现实世界中的关键破坏者计算成本估算值的能力。最后,我们还介绍了IoT节点的处理负载与所需的隐私保护时间跨度之间的权衡。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号