Netinfo Security ›› 2017, Vol. 17 ›› Issue (10): 13-21.doi: 10.3969/j.issn.1671-1122.2017.10.003

• Orginal Article • Previous Articles     Next Articles

An End-to-End Security Scheme of the Internet of Things

Guojun MA1,2(), Lei BAI2, Qingqi PEI2, Xiangjun LI1   

  1. 1. School of Information Engineering, Xi’an University, Xi’an Shannxi 710065, China
    2. State Key Laboratory of Integrated Service Networks, Xidian University, Xi’an Shannxi 710071, China
  • Received:2017-07-01 Online:2017-10-10 Published:2020-05-12

Abstract:

Security problem is one of the main challenges of IoT. Many constrained devices of IoT are operating under low power, and with limited computational and network resources, and cannot use standard security protocols to protect end-to-end security, they become the weakness of IoT. An IoT security architecture based on edge computing and a proxy-based Datagram Transport Layer Security end-to-end security scheme based on the architecture were proposed. Analysis and experiment show that the scheme can enable the constrained devices to communicate with any remote devices using the Internet standard security protocol in a security way. At the same time, the scheme is scalable, feasible and practical.

Key words: IoT, end-to-end security, constrained devices, edge computing

CLC Number: