Tangible security: Survey of methods supporting secure ad-hoc connects of edge devices with physical context.

Item Type Journal paper
Abstract Edge computing is the concept of moving computation back to the endpoints of a network, as an alternative to, or in combination with, centralized, cloud-based architectures. It is especially of interest for Internet-of-Things and Cyber-Physical Systems where embedded endpoints make up the edge of the network, and where these devices need to make localised, time-critical decisions. In these environment secure, ad-hoc device-to-device interaction is important, but offers a challenge because devices might belong to different systems, or security domains, which complicates trusted communication and key establishment. There has been a growing interest in complementing conventional cryptography with physical context. This allows for services that are difficult to achieve with existing cryptographic mechanisms: devices pairing (initial key establishment) and proof-of-proximity (ensuring devices are physically present). Numerous methods, the majority of which are based on the physical context of device characteristics, behavior or environment, have been proposed to supplement cryptography in achieving these services. This paper provides an overview of this area of research, first discussing the nature and importance of the two specified security services in ad-hoc communication settings and then providing an introduction to prominent physical context security approaches in literature.
Authors Hu, Qiao; Zhang, Jingyi; Mitrokotsa, Aikaterini & Hancke, Gerhard
Journal or Publication Title Computers & Security
Language English
Keywords Physical-context security Key management Device pairing Proof-of-proximity Relay attack
Subjects computer science
HSG Classification contribution to scientific community
Refereed Yes
Date 30 July 2018
Publisher Elsevier
Volume 78
Page Range 281-300
Number of Pages 20
Publisher DOI https://doi.org/10.1016/j.cose.2018.06.009
Official URL https://www.sciencedirect.com/science/article/pii/...
Depositing User Eriane Breu
Date Deposited 02 Apr 2021 18:53
Last Modified 20 Jul 2022 17:45
URI: https://www.alexandria.unisg.ch/publications/262923

Download

[img] Text
TangibleSecurity18.pdf

Download (2MB)

Citation

Hu, Qiao; Zhang, Jingyi; Mitrokotsa, Aikaterini & Hancke, Gerhard (2018) Tangible security: Survey of methods supporting secure ad-hoc connects of edge devices with physical context. Computers & Security, 78 281-300.

Statistics

https://www.alexandria.unisg.ch/id/eprint/262923
Edit item Edit item
Feedback?