Internet of Things Architecture

(Elliott) #1

Internet of Things – Architecture © - 99 -


Figure 29 : NTC, NTU and CDSecFeat.

In the figure above, the CDSecFeat (Constrained device security feature)
implementation leverages the extension of the functionalities of gateway
devices


Figure 29 above depicts our approach to lower-layer security in IoT. We exploit
gateways as explained below:


On the edge between the domains of unconstrained and constrained devices,
gateways have the role of adapting communication between the two domains.
Gateways are unconstrained devices, therefore, they can be exploited to boost
up the security of constrained devices by running on their behalf energy-hungry
and complex security mechanisms. In addition, gateways can also be used in
order manage security settings in peripheral NTC networks.


We enable these functionalities in the gateways by extending them with the
following features:


 Protocol adaptation between different networks (by definition);

 Tunnelling between themselves and other nodes of the NTU domain.
(Optional; impacts on trust assessment);

 Management of security features belonging to the peripheral network
(Optional);
Free download pdf