Research Article
BibTex RIS Cite

Edge Computing Security with an IoT device

Year 2021, Volume: 1 Issue: 1, 14 - 17, 30.06.2021

Abstract

Information technologies are changing every aspect of human life day by day. In this context, Edge Computing, Internet of Things, Machine Learning and Big Data Analytics technologies are thought to be a part of this change. Edge computing aims to bring the computing power from the remote cloud environments to the endpoints/edges of networks. Thus, smart applications do not have to send all their data to the cloud and wait for the answers to come back over the same long route. Despite this advantage, there are security risks in the edge computing process. Encryption of information is of great importance especially for IoT devices to perform transactions safely. With a system established in this study, encrypted communication has been tried to be provided on IoT devices performing edge computing. In this way, it is aimed to make the communication secure. Arduino is used as an IoT device. In the encryption process, AES encryption is used with 128-bit and 256-bit key length.

References

  • Satyanarayanan, M. (2017). Edge Computing. IEEE Computer, 50(10), 36-38.
  • Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal, 4(5), 1125-1142.
  • Bull, P., Austin, R., Popov, E., Sharma, M., & Watson, R. (2016, August). Flow based security for IoT devices using an SDN gateway. In 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud) (pp. 157-163). IEEE.
  • Meng, W., Li, W., Su, C., Zhou, J., & Lu, R. (2017). Enhancing trust management for wireless intrusion detection via traffic sampling in the era of big data. Ieee Access, 6, 7234-7243.
  • Wang, T., Zhang, G., Liu, A., Bhuiyan, M. Z. A., & Jin, Q. (2018). A secure IoT service architecture with an efficient balance dynamics based on cloud and edge computing. IEEE Internet of Things Journal, 6(3), 4831-4843.
  • Akkuş, S. (2016). Gömülü sistem tabanlı, kriptolu TCP/IP veri haberleşmesi uygulaması.
  • Cabuk, U. C., Aydın, Ö., & Dalkılıç, G. (2017). A random number generator for lightweight authentication protocols: xorshiftR+. Turkish Journal of Electrical Engineering & Computer Sciences, 25(6), 4818-4828.
  • Kösemen, C., Dalkılıç, G., & Aydın, Ö. (2018). Genetic programming-based pseudorandom number generator for wireless identification and sensing platform. Turkish Journal of Electrical Engineering & Computer Sciences, 26(5), 2500-2511.
  • O'Neill ME. PCG: A family of simple fast space-efficient statistically good algorithms for random number generation.Available online at http://www.pcg-random.org/pdf/toms-oneill-pcg-family-v1.02.pdf
  • Aydın, Ö., & Dalkılıç, G. (2018, July). A hybrid random number generator for lightweight cryptosystems: xorshiftLplus. The 3rd International Conference on Engineering Technology and Applied Sciences (ICETAS).
  • Aydın, Ö., & Kösemen, C. (2020). XorshiftUL+: A novel hybrid random number generator for internet of things and wireless sensor network applications. Pamukkale Üniversitesi Mühendislik Bilimleri Dergisi, 26(5), 953-958.
  • Armknecht F, Hamann M, Mikhalev V. Lightweight authentication protocols on ultra-constrained RFIDs-mythsand facts. In: International Workshop on Radio Frequency Identification: Security and Privacy Issues; 2015. pp.1-18. Springer, Cham.
  • Lee JY, Lin WC, Huang YH. A lightweight authentication protocol for internet of things. In: 2014 InternationalSymposium on Next-Generation Electronics (ISNE); New York, USA; 2014. pp. 1-2.
  • Aydın, Ö., Dalkılıç, G., & Kösemen, C. (2020). A novel grouping proof authentication protocol for lightweight devices: GPAPXR+. Turkish Journal of Electrical Engineering & Computer Sciences, 28(5), 3036-3051.
  • Şeker, Ş.E. (2009). AES ve Rijndeal Şifreleme. Bilgisayar Kavramları. Retrieved from http://bilgisayarkavramlari.com/2009/06/03/aes-ve-rijndeal-sifreleme/ , Accessed date : 25.11.2020
  • Surian, D. (2006). Algoritma Kriptografi AES Rijndael. TESLA Jurnal Teknik Elektro UNTAR, 8(2), 97-101.

Edge Computing Security with an IoT device

Year 2021, Volume: 1 Issue: 1, 14 - 17, 30.06.2021

Abstract

Information technologies are changing every aspect of human life day by day. In this context, Edge Computing, Internet of Things, Machine Learning and Big Data Analytics technologies are thought to be a part of this change. Edge computing aims to bring the computing power from the remote cloud environments to the endpoints/edges of networks. Thus, smart applications do not have to send all their data to the cloud and wait for the answers to come back over the same long route. Despite this advantage, there are security risks in the edge computing process. Encryption of information is of great importance especially for IoT devices to perform transactions safely. With a system established in this study, encrypted communication has been tried to be provided on IoT devices performing edge computing. In this way, it is aimed to make the communication secure. Arduino is used as an IoT device. In the encryption process, AES encryption is used with 128-bit and 256-bit key length.

References

  • Satyanarayanan, M. (2017). Edge Computing. IEEE Computer, 50(10), 36-38.
  • Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal, 4(5), 1125-1142.
  • Bull, P., Austin, R., Popov, E., Sharma, M., & Watson, R. (2016, August). Flow based security for IoT devices using an SDN gateway. In 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud) (pp. 157-163). IEEE.
  • Meng, W., Li, W., Su, C., Zhou, J., & Lu, R. (2017). Enhancing trust management for wireless intrusion detection via traffic sampling in the era of big data. Ieee Access, 6, 7234-7243.
  • Wang, T., Zhang, G., Liu, A., Bhuiyan, M. Z. A., & Jin, Q. (2018). A secure IoT service architecture with an efficient balance dynamics based on cloud and edge computing. IEEE Internet of Things Journal, 6(3), 4831-4843.
  • Akkuş, S. (2016). Gömülü sistem tabanlı, kriptolu TCP/IP veri haberleşmesi uygulaması.
  • Cabuk, U. C., Aydın, Ö., & Dalkılıç, G. (2017). A random number generator for lightweight authentication protocols: xorshiftR+. Turkish Journal of Electrical Engineering & Computer Sciences, 25(6), 4818-4828.
  • Kösemen, C., Dalkılıç, G., & Aydın, Ö. (2018). Genetic programming-based pseudorandom number generator for wireless identification and sensing platform. Turkish Journal of Electrical Engineering & Computer Sciences, 26(5), 2500-2511.
  • O'Neill ME. PCG: A family of simple fast space-efficient statistically good algorithms for random number generation.Available online at http://www.pcg-random.org/pdf/toms-oneill-pcg-family-v1.02.pdf
  • Aydın, Ö., & Dalkılıç, G. (2018, July). A hybrid random number generator for lightweight cryptosystems: xorshiftLplus. The 3rd International Conference on Engineering Technology and Applied Sciences (ICETAS).
  • Aydın, Ö., & Kösemen, C. (2020). XorshiftUL+: A novel hybrid random number generator for internet of things and wireless sensor network applications. Pamukkale Üniversitesi Mühendislik Bilimleri Dergisi, 26(5), 953-958.
  • Armknecht F, Hamann M, Mikhalev V. Lightweight authentication protocols on ultra-constrained RFIDs-mythsand facts. In: International Workshop on Radio Frequency Identification: Security and Privacy Issues; 2015. pp.1-18. Springer, Cham.
  • Lee JY, Lin WC, Huang YH. A lightweight authentication protocol for internet of things. In: 2014 InternationalSymposium on Next-Generation Electronics (ISNE); New York, USA; 2014. pp. 1-2.
  • Aydın, Ö., Dalkılıç, G., & Kösemen, C. (2020). A novel grouping proof authentication protocol for lightweight devices: GPAPXR+. Turkish Journal of Electrical Engineering & Computer Sciences, 28(5), 3036-3051.
  • Şeker, Ş.E. (2009). AES ve Rijndeal Şifreleme. Bilgisayar Kavramları. Retrieved from http://bilgisayarkavramlari.com/2009/06/03/aes-ve-rijndeal-sifreleme/ , Accessed date : 25.11.2020
  • Surian, D. (2006). Algoritma Kriptografi AES Rijndael. TESLA Jurnal Teknik Elektro UNTAR, 8(2), 97-101.
There are 16 citations in total.

Details

Primary Language English
Subjects Computer Software
Journal Section Research Articles
Authors

Beyda Nur Kars This is me

Publication Date June 30, 2021
Published in Issue Year 2021 Volume: 1 Issue: 1

Cite

APA Kars, B. N. (2021). Edge Computing Security with an IoT device. Journal of Emerging Computer Technologies, 1(1), 14-17.
Journal of Emerging Computer Technologies
is indexed and abstracted by
Index Copernicus, ROAD, Academia.edu, Google Scholar, Asos Index, Academic Resource Index (Researchbib), OpenAIRE, IAD, Cosmos, EuroPub, Academindex

Publisher
Izmir Academy Association