Towards Strategies for Secure Data Transfer of IoT Devices with Limited Resources

Nasser Salem Albalawi, Michael Riegler, Jerzy W. Rozenblit

Research output: Chapter in Book/Report/Conference proceedingConference proceedingspeer-review

Abstract

Many Cyber Physical Systems (CPSs) and Internet of Things (IoT) devices are constrained in terms of computation speed, memory, power, area and bandwidth. As they interact with the physical world, various aspects such as safety, security, and privacy should be considered while processing personal data. Systems should continue operating even under harsh conditions and when the network connections (e.g., to the cloud) are lost. If that happens and the storage capacity is limited, sensor data may be overwritten irrevocably. This paper presents preliminary ideas and the planned research methodology to examine and define strategies to secure the data transfer from IoT devices which have limitations to edge devices and the cloud, and to overcome the situation when a device loses its connection, to mitigate data loss.
Original languageEnglish
Title of host publicationDatabase and Expert Systems Applications - DEXA 2022 Workshops - 33rd International Conference, DEXA 2022, Proceedings
EditorsGabriele Kotsis, Ismail Khalil, Atif Mashkoor, Johannes Sametinger, A Min Tjoa, Bernhard Moser, Jorge Martinez-Gil, Florian Sobieczky, Lukas Fischer, Rudolf Ramler, Gerald Czech, Alfred Taudes, Maqbool Khan
Place of PublicationCham
PublisherSpringer
Pages331-336
Number of pages6
ISBN (Print)978-3-031-14343-4
DOIs
Publication statusPublished - 2022

Publication series

NameCommunications in Computer and Information Science
Volume1633 CCIS
ISSN (Print)1865-0929
ISSN (Electronic)1865-0937

Fields of science

  • 102 Computer Sciences

JKU Focus areas

  • Digital Transformation

Cite this