首页> 外文期刊>Computers & Security >Tangible security: Survey of methods supporting secure ad-hoc connects of edge devices with physical context
【24h】

Tangible security: Survey of methods supporting secure ad-hoc connects of edge devices with physical context

机译:有形的安全性:对支持边缘设备与物理上下文的安全临时连接的方法的调查

获取原文
获取原文并翻译 | 示例

摘要

Edge computing is the concept of moving computation back to the endpoints of a network, as an alternative to, or in combination with, centralized, cloud-based architectures. It is especially of interest for Internet-of-Things and Cyber-Physical Systems where embedded endpoints make up the edge of the network, and where these devices need to make localised, time-critical decisions. In these environment secure, ad-hoc device-to-device interaction is important, but offers a challenge because devices might belong to different systems, or security domains, which complicates trusted communication and key establishment. There has been a growing interest in complementing conventional cryptography with physical context. This allows for services that are difficult to achieve with existing cryptographic mechanisms: devices pairing (initial key establishment) and proof-of-proximity (ensuring devices are physically present). Numerous methods, the majority of which are based on the physical context of device characteristics, behavior or environment, have been proposed to supplement cryptography in achieving these services. This paper provides an overview of this area of research, first discussing the nature and importance of the two specified security services in ad-hoc communication settings and then providing an introduction to prominent physical context security approaches in literature. (C) 2018 Elsevier Ltd. All rights reserved.
机译:边缘计算是将计算移回网络端点的概念,可以替代集中式基于云的体系结构或与之结合。物联网和网络物理系统特别受关注,其中嵌入式端点构成了网络的边缘,这些设备需要做出本地化的,对时间要求严格的决策。在这些环境中,安全的,即席设备到设备的临时交互非常重要,但是却带来了挑战,因为设备可能属于不同的系统或安全域,这使受信任的通信和密钥建立变得复杂。用物理环境补充传统密码学的兴趣日益浓厚。这允许使用现有的加密机制难以实现的服务:设备配对(初始密钥建立)和邻近证明(确保物理上存在设备)。已经提出了许多方法,其中大多数是基于设备特征,行为或环境的物理环境的,以补充加密来实现这些服务。本文概述了这一研究领域,首先讨论了两种特定安全服务在临时通信设置中的性质和重要性,然后介绍了文献中著名的物理上下文安全方法。 (C)2018 Elsevier Ltd.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号