Araştırma Makalesi
BibTex RIS Kaynak Göster

Edge Computing Security with an IoT device

Yıl 2021, Cilt: 1 Sayı: 1, 14 - 17, 30.06.2021

Öz

Information technologies are changing every aspect of human life day by day. In this context, Edge Computing, Internet of Things, Machine Learning and Big Data Analytics technologies are thought to be a part of this change. Edge computing aims to bring the computing power from the remote cloud environments to the endpoints/edges of networks. Thus, smart applications do not have to send all their data to the cloud and wait for the answers to come back over the same long route. Despite this advantage, there are security risks in the edge computing process. Encryption of information is of great importance especially for IoT devices to perform transactions safely. With a system established in this study, encrypted communication has been tried to be provided on IoT devices performing edge computing. In this way, it is aimed to make the communication secure. Arduino is used as an IoT device. In the encryption process, AES encryption is used with 128-bit and 256-bit key length.

Kaynakça

  • Satyanarayanan, M. (2017). Edge Computing. IEEE Computer, 50(10), 36-38.
  • Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal, 4(5), 1125-1142.
  • Bull, P., Austin, R., Popov, E., Sharma, M., & Watson, R. (2016, August). Flow based security for IoT devices using an SDN gateway. In 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud) (pp. 157-163). IEEE.
  • Meng, W., Li, W., Su, C., Zhou, J., & Lu, R. (2017). Enhancing trust management for wireless intrusion detection via traffic sampling in the era of big data. Ieee Access, 6, 7234-7243.
  • Wang, T., Zhang, G., Liu, A., Bhuiyan, M. Z. A., & Jin, Q. (2018). A secure IoT service architecture with an efficient balance dynamics based on cloud and edge computing. IEEE Internet of Things Journal, 6(3), 4831-4843.
  • Akkuş, S. (2016). Gömülü sistem tabanlı, kriptolu TCP/IP veri haberleşmesi uygulaması.
  • Cabuk, U. C., Aydın, Ö., & Dalkılıç, G. (2017). A random number generator for lightweight authentication protocols: xorshiftR+. Turkish Journal of Electrical Engineering & Computer Sciences, 25(6), 4818-4828.
  • Kösemen, C., Dalkılıç, G., & Aydın, Ö. (2018). Genetic programming-based pseudorandom number generator for wireless identification and sensing platform. Turkish Journal of Electrical Engineering & Computer Sciences, 26(5), 2500-2511.
  • O'Neill ME. PCG: A family of simple fast space-efficient statistically good algorithms for random number generation.Available online at http://www.pcg-random.org/pdf/toms-oneill-pcg-family-v1.02.pdf
  • Aydın, Ö., & Dalkılıç, G. (2018, July). A hybrid random number generator for lightweight cryptosystems: xorshiftLplus. The 3rd International Conference on Engineering Technology and Applied Sciences (ICETAS).
  • Aydın, Ö., & Kösemen, C. (2020). XorshiftUL+: A novel hybrid random number generator for internet of things and wireless sensor network applications. Pamukkale Üniversitesi Mühendislik Bilimleri Dergisi, 26(5), 953-958.
  • Armknecht F, Hamann M, Mikhalev V. Lightweight authentication protocols on ultra-constrained RFIDs-mythsand facts. In: International Workshop on Radio Frequency Identification: Security and Privacy Issues; 2015. pp.1-18. Springer, Cham.
  • Lee JY, Lin WC, Huang YH. A lightweight authentication protocol for internet of things. In: 2014 InternationalSymposium on Next-Generation Electronics (ISNE); New York, USA; 2014. pp. 1-2.
  • Aydın, Ö., Dalkılıç, G., & Kösemen, C. (2020). A novel grouping proof authentication protocol for lightweight devices: GPAPXR+. Turkish Journal of Electrical Engineering & Computer Sciences, 28(5), 3036-3051.
  • Şeker, Ş.E. (2009). AES ve Rijndeal Şifreleme. Bilgisayar Kavramları. Retrieved from http://bilgisayarkavramlari.com/2009/06/03/aes-ve-rijndeal-sifreleme/ , Accessed date : 25.11.2020
  • Surian, D. (2006). Algoritma Kriptografi AES Rijndael. TESLA Jurnal Teknik Elektro UNTAR, 8(2), 97-101.

Edge Computing Security with an IoT device

Yıl 2021, Cilt: 1 Sayı: 1, 14 - 17, 30.06.2021

Öz

Information technologies are changing every aspect of human life day by day. In this context, Edge Computing, Internet of Things, Machine Learning and Big Data Analytics technologies are thought to be a part of this change. Edge computing aims to bring the computing power from the remote cloud environments to the endpoints/edges of networks. Thus, smart applications do not have to send all their data to the cloud and wait for the answers to come back over the same long route. Despite this advantage, there are security risks in the edge computing process. Encryption of information is of great importance especially for IoT devices to perform transactions safely. With a system established in this study, encrypted communication has been tried to be provided on IoT devices performing edge computing. In this way, it is aimed to make the communication secure. Arduino is used as an IoT device. In the encryption process, AES encryption is used with 128-bit and 256-bit key length.

Kaynakça

  • Satyanarayanan, M. (2017). Edge Computing. IEEE Computer, 50(10), 36-38.
  • Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal, 4(5), 1125-1142.
  • Bull, P., Austin, R., Popov, E., Sharma, M., & Watson, R. (2016, August). Flow based security for IoT devices using an SDN gateway. In 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud) (pp. 157-163). IEEE.
  • Meng, W., Li, W., Su, C., Zhou, J., & Lu, R. (2017). Enhancing trust management for wireless intrusion detection via traffic sampling in the era of big data. Ieee Access, 6, 7234-7243.
  • Wang, T., Zhang, G., Liu, A., Bhuiyan, M. Z. A., & Jin, Q. (2018). A secure IoT service architecture with an efficient balance dynamics based on cloud and edge computing. IEEE Internet of Things Journal, 6(3), 4831-4843.
  • Akkuş, S. (2016). Gömülü sistem tabanlı, kriptolu TCP/IP veri haberleşmesi uygulaması.
  • Cabuk, U. C., Aydın, Ö., & Dalkılıç, G. (2017). A random number generator for lightweight authentication protocols: xorshiftR+. Turkish Journal of Electrical Engineering & Computer Sciences, 25(6), 4818-4828.
  • Kösemen, C., Dalkılıç, G., & Aydın, Ö. (2018). Genetic programming-based pseudorandom number generator for wireless identification and sensing platform. Turkish Journal of Electrical Engineering & Computer Sciences, 26(5), 2500-2511.
  • O'Neill ME. PCG: A family of simple fast space-efficient statistically good algorithms for random number generation.Available online at http://www.pcg-random.org/pdf/toms-oneill-pcg-family-v1.02.pdf
  • Aydın, Ö., & Dalkılıç, G. (2018, July). A hybrid random number generator for lightweight cryptosystems: xorshiftLplus. The 3rd International Conference on Engineering Technology and Applied Sciences (ICETAS).
  • Aydın, Ö., & Kösemen, C. (2020). XorshiftUL+: A novel hybrid random number generator for internet of things and wireless sensor network applications. Pamukkale Üniversitesi Mühendislik Bilimleri Dergisi, 26(5), 953-958.
  • Armknecht F, Hamann M, Mikhalev V. Lightweight authentication protocols on ultra-constrained RFIDs-mythsand facts. In: International Workshop on Radio Frequency Identification: Security and Privacy Issues; 2015. pp.1-18. Springer, Cham.
  • Lee JY, Lin WC, Huang YH. A lightweight authentication protocol for internet of things. In: 2014 InternationalSymposium on Next-Generation Electronics (ISNE); New York, USA; 2014. pp. 1-2.
  • Aydın, Ö., Dalkılıç, G., & Kösemen, C. (2020). A novel grouping proof authentication protocol for lightweight devices: GPAPXR+. Turkish Journal of Electrical Engineering & Computer Sciences, 28(5), 3036-3051.
  • Şeker, Ş.E. (2009). AES ve Rijndeal Şifreleme. Bilgisayar Kavramları. Retrieved from http://bilgisayarkavramlari.com/2009/06/03/aes-ve-rijndeal-sifreleme/ , Accessed date : 25.11.2020
  • Surian, D. (2006). Algoritma Kriptografi AES Rijndael. TESLA Jurnal Teknik Elektro UNTAR, 8(2), 97-101.
Toplam 16 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Bilgisayar Yazılımı
Bölüm Araştırma Makaleleri
Yazarlar

Beyda Nur Kars Bu kişi benim

Yayımlanma Tarihi 30 Haziran 2021
Yayımlandığı Sayı Yıl 2021 Cilt: 1 Sayı: 1

Kaynak Göster

APA Kars, B. N. (2021). Edge Computing Security with an IoT device. Journal of Emerging Computer Technologies, 1(1), 14-17.

Journal of Emerging Computer Technologies
is indexed and abstracted by
Index Copernicus, ROAD, Academia.edu, Google Scholar, Asos Index, Academic Resource Index (Researchbib), OpenAIRE, IAD, Cosmos, EuroPub, Academindex

Publisher
Izmir Academy Association
www.izmirakademi.org