TY - GEN
T1 - Towards Strategies for Secure Data Transfer of IoT Devices with Limited Resources
AU - Albalawi, Nasser S.
AU - Riegler, Michael
AU - Rozenblit, Jerzy W.
N1 - Publisher Copyright:
© 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.
PY - 2022
Y1 - 2022
N2 - Many Cyber Physical Systems (CPSs) and Internet of Things (IoT) devices are constrained in terms of computation speed, memory, power, area and bandwidth. As they interact with the physical world, various aspects such as safety, security, and privacy should be considered while processing personal data. Systems should continue operating even under harsh conditions and when the network connections (e.g., to the cloud) are lost. If that happens and the storage capacity is limited, sensor data may be overwritten irrevocably. This paper presents preliminary ideas and the planned research methodology to examine and define strategies to secure the data transfer from IoT devices which have limitations to edge devices and the cloud, and to overcome the situation when a device loses its connection, to mitigate data loss.
AB - Many Cyber Physical Systems (CPSs) and Internet of Things (IoT) devices are constrained in terms of computation speed, memory, power, area and bandwidth. As they interact with the physical world, various aspects such as safety, security, and privacy should be considered while processing personal data. Systems should continue operating even under harsh conditions and when the network connections (e.g., to the cloud) are lost. If that happens and the storage capacity is limited, sensor data may be overwritten irrevocably. This paper presents preliminary ideas and the planned research methodology to examine and define strategies to secure the data transfer from IoT devices which have limitations to edge devices and the cloud, and to overcome the situation when a device loses its connection, to mitigate data loss.
KW - IoT
KW - Limitations
KW - Resources
KW - Security
UR - http://www.scopus.com/inward/record.url?scp=85136970833&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85136970833&partnerID=8YFLogxK
U2 - 10.1007/978-3-031-14343-4_30
DO - 10.1007/978-3-031-14343-4_30
M3 - Conference contribution
AN - SCOPUS:85136970833
SN - 9783031143427
T3 - Communications in Computer and Information Science
SP - 331
EP - 336
BT - Database and Expert Systems Applications - DEXA 2022 Workshops - 33rd International Conference, DEXA 2022, Proceedings
A2 - Kotsis, Gabriele
A2 - Khalil, Ismail
A2 - Mashkoor, Atif
A2 - Sametinger, Johannes
A2 - Tjoa, A Min
A2 - Moser, Bernhard
A2 - Martinez-Gil, Jorge
A2 - Sobieczky, Florian
A2 - Fischer, Lukas
A2 - Ramler, Rudolf
A2 - Czech, Gerald
A2 - Taudes, Alfred
A2 - Khan, Maqbool
PB - Springer Science and Business Media Deutschland GmbH
T2 - 6th International Workshop on Cyber-Security and Functional Safety in Cyber-Physical Systems, IWCFS 2022, 4th International Workshop on Machine Learning and Knowledge Graphs, MLKgraphs 2022, 2nd International Workshop on Time Ordered Data, ProTime2022, 2nd International Workshop on AI System Engineering: Math, Modelling and Software, AISys2022, 1st International Workshop on Distributed Ledgers and Related Technologies, DLRT2022 and 1st International Workshop on Applied Research, Technology Transfer and Knowledge Exchange in Software and Data Science, ARTE2022 held at 33rd International Conference on Database and Expert Systems Applications, DEXA 2022
Y2 - 22 August 2022 through 24 August 2022
ER -