Luke Jakielaszek, Xuening Xu, Xiaojiang Du, E. Ratazzi
{"title":"Fine-Tuned Access Control for Internet of Things","authors":"Luke Jakielaszek, Xuening Xu, Xiaojiang Du, E. Ratazzi","doi":"10.1109/FMEC57183.2022.10062612","DOIUrl":null,"url":null,"abstract":"Security within the internet of things suffers from balancing power consumption and memory usage in devices. We propose two protocols that aim to reduce these strains while maintaining effective security through symmetric keys. Our first protocol takes a user-level approach for fine-tuned access control over advanced operations between a device and its installed software. Our second protocol allows for flexibility between the energy and memory tradeoff for network designers along with a dynamic bootstrapping mechanism for an already established network.","PeriodicalId":129184,"journal":{"name":"2022 Seventh International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Seventh International Conference on Fog and Mobile Edge Computing (FMEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FMEC57183.2022.10062612","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Security within the internet of things suffers from balancing power consumption and memory usage in devices. We propose two protocols that aim to reduce these strains while maintaining effective security through symmetric keys. Our first protocol takes a user-level approach for fine-tuned access control over advanced operations between a device and its installed software. Our second protocol allows for flexibility between the energy and memory tradeoff for network designers along with a dynamic bootstrapping mechanism for an already established network.