Impact of Duty Cycle Protocols on Security Cost of IoT
نویسندگان
چکیده
With the evolution of IoT embedded devices and their broad application, security has become crucial. Security comes at a cost to these limited devices in terms of energy. However, evaluating security cost is not straightforward, as there are many factors involved, such as the employed security services and type of hardware. This research studies the impact of duty cycle protocols on security cost in IoT embedded devices. It begins by evaluating the cost of security on a per-packet basis, and then evaluates how duty cycle protocols could affect security cost. The research demonstrates the relationship between duty cycle protocols and security cost, which could be a source of confusion when measuring the actual security cost in a real scenario.
منابع مشابه
Circuits and protocols for low duty cycle wireless systems
IoT devices are helping improve efficiency and expanding capabilities in an increasing number of applications including industrial, home and personal fitness. Device lifetimes are still a concern, and improved energy efficiency is needed. Additionally, aggressive duty cycling is needed to operate these IoT devices in severely energyconstrained applications. Wireless communication, which consume...
متن کاملImproving LoRaWAN Performance Using Reservation ALOHA
LoRaWAN is one of the new and updated standards for IoT applications. However, the expected high density of peripheral devices for each gateway, and the absence of an operative synchronization mechanism between the gateway and peripherals, all of which challenges the networks scalability. In this paper, we propose to normalize the communication of LoRaWAN networks using a Reservation-ALOHA (R-A...
متن کاملSome observations on a lightweight authentication scheme with capabilities of anonymity and trust in Internet of Things (IoT)
Over the last years, the concept of Internet of Things (IoT) leads to a revolution in the communications of humans and things. Security and efficiency could be the main challenges of that communication. On the other hand, authenticity and confidentiality are two important goals to provide desired security in an information system, including IoT-based applications. An Authentication an...
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملA Study of Developing Security Requirements for Internet of Things (IoT)
IoT service provides interconnection between ‘Things’ in many industry areas (home appliance, traffic, medical services, etc.). However, because of the IoT environment is consisted of various devices, network protocols, platforms, there are many security risks such as IoT device hacking, privacy infringement, information leakage, etc. Therefore, to make a secure and safe IoT environment, identi...
متن کامل