EconPapers    
Economics at your fingertips  
 

Novel lightweight interactive IoT end device architecture with tight security intelligence confidentiality, integrity, authenticity and availability

Prateek Mishra (), Sanjay Kumar Yadav (), Ravi Kumar Sachdeva () and Amit Kishor ()
Additional contact information
Prateek Mishra: Sam Higginbottom University of Agriculture, Technology and Science
Sanjay Kumar Yadav: Sam Higginbottom University of Agriculture, Technology and Science
Ravi Kumar Sachdeva: Asia Pacific Institute of Information Technology(APIIT) SD
Amit Kishor: Swami Vivekanand Subharti University

International Journal of System Assurance Engineering and Management, 2022, vol. 13, issue 1, No 22, 212-224

Abstract: Abstract IoT end devices are resource deficient due to least processing power and footprint therefore need lightweight resources for optimum performance and optimum footprint. But presence of unsecure world and unsecure operating system in the existing architectures (Guan et al., 2017; Pinto in IEEE Internet Comput 21: 40–47, 2017; Zhang in Futur Gener Comput Syst 88:16–27) make the IoT devices over-architectured and over-interactive hence performance overhead and unsecure. Unlike existing architectures in this paper our proposed architecture does not use any operating system and apply lightweight µ-visor at the fog and lightweight s/w layers at the IoT edge over ESP32 microcontroller using Arduino IDE so as to exclude over-architecture hence lightweight. Lightweight architecture must include minimum trusted computing base therefore least surface area for attack hence least number of bugs thus secure. Our architecture also incurs security intelligence both at IoT edge and fog since boot till s/w stack upload. Security intelligence confirms intra-device security in terms of confidentiality, integrity, authenticity and availability (CIAA). In our architecture Secure IoT algorithm uses 64 bits key thus optimizes encryption decryption process. Communication between IoT edge and fog is also governed by communication security intelligence. This paper finally compares over-architectural and security issues among existing and proposed architectures using graph hence validate that proposed architecture is lightweight, interactive and equipped with tight security intelligence CIAA.

Keywords: CIAA; IoT end device; Lightweight; Over-architectured; Security intelligence (search for similar items in EconPapers)
Date: 2022
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
http://link.springer.com/10.1007/s13198-021-01369-4 Abstract (text/html)
Access to the full text of the articles in this series is restricted.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:spr:ijsaem:v:13:y:2022:i:1:d:10.1007_s13198-021-01369-4

Ordering information: This journal article can be ordered from
http://www.springer.com/engineering/journal/13198

DOI: 10.1007/s13198-021-01369-4

Access Statistics for this article

International Journal of System Assurance Engineering and Management is currently edited by P.K. Kapur, A.K. Verma and U. Kumar

More articles in International Journal of System Assurance Engineering and Management from Springer, The Society for Reliability, Engineering Quality and Operations Management (SREQOM),India, and Division of Operation and Maintenance, Lulea University of Technology, Sweden
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

 
Page updated 2025-03-20
Handle: RePEc:spr:ijsaem:v:13:y:2022:i:1:d:10.1007_s13198-021-01369-4