Sharing Security Information Between Resource Constrained Network Nodes

Challenges in resource constrained IoT networks are driven by the miniaturization of purpose-specific hardware and the imperative for cost-efficiency. These characteristics make traditional security solutions, which focus on securing individual devices, unrealistic. Instead, decentralized solutions...

Full description

Bibliographic Details
Main Author: Markkanen, Veikko
Other Authors: Faculty of Information Technology, Informaatioteknologian tiedekunta, University of Jyväskylä, Jyväskylän yliopisto
Format: Master's thesis
Language:eng
Published: 2024
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/95346
_version_ 1826225731010560000
author Markkanen, Veikko
author2 Faculty of Information Technology Informaatioteknologian tiedekunta University of Jyväskylä Jyväskylän yliopisto
author_facet Markkanen, Veikko Faculty of Information Technology Informaatioteknologian tiedekunta University of Jyväskylä Jyväskylän yliopisto Markkanen, Veikko Faculty of Information Technology Informaatioteknologian tiedekunta University of Jyväskylä Jyväskylän yliopisto
author_sort Markkanen, Veikko
datasource_str_mv jyx
description Challenges in resource constrained IoT networks are driven by the miniaturization of purpose-specific hardware and the imperative for cost-efficiency. These characteristics make traditional security solutions, which focus on securing individual devices, unrealistic. Instead, decentralized solutions that leverage the collective resources of a network must be considered. For these solutions, key enablers include self-configuration, scalability, resilience to extreme dynamics, and the overall sustainability and reliability of the network, suggesting the ad hoc paradigm, an attractive foundation for development. Therefore, the objective of this master’s thesis is to examine the feasibility of ad hoc networking in providing a reliable communication framework for sharing security information between resource constrained devices. The research consists of the examination of major challenges in resource constrained IoT systems and exploration of promising solutions from academic literature. It details various categories of ad hoc networking, key standards, and routing protocols. Additionally, a simulation artifact was developed to assess the feasibility of using ad hoc networking to distribute security information among resource constrained devices across different network sizes. The findings indicate that ad hoc networking is an efficient and scalable framework for sharing security information in terms of throughput, latency, and the overall reliability of the introduced security functionality. The key factors affecting these values could be identified as the physical topology of the network and the availability of existing routes between nodes. Furthermore, the alignment of ad hoc networking with academically proposed solutions was affirmed. The results from this thesis can provide a reference base for further steps in validating ad hoc networking as a suitable communication framework upon which more complex, decentralized security functionalities can be implemented. Resurssivajeisten IoT-verkkojen turvallisuushaasteet juontavat juurensa tarkasti rajattuun tehtävään suunniteltujen laitteiden optimoinnista kustannustehokkuutta varten. Tässä ympäristössä laitteiden suojaaminen perinteisin, yksittäiseen laitteeseen keskittyvin menetelmin, ei ole realistista. Vastuu kyberturvasta tulisi hajauttaa verkon kollektiivisia resursseja hyödyntäen. Hajautettujen menetelmien ytimessä on laitteiden kyky muodostaa autonomisia, skaalautuvia ja kestäviä verkkoja, joiden rakentamiseksi ad hoc -verkkoteknologia tarjoaa hedelmällisen perustan. Näin ollen, tämän pro gradu -tutkimuksen tavoitteena on kartoittaa ad hoc -verkkoteknologian soveltuvuutta turvallisuustiedon jakamiseen resurssivajeesta kärsivien laitteiden kesken. Tutkimus koostuu IoT-verkoille tyypillisten haasteiden tunnistamisesta, sekä akateemisessa kirjallisuudessa esitettyjen ratkaisujen käsittelystä. Se erittelee ad hoc -verkkojen kategoriat, keskeisiä standardeja sekä reititysprotokollia, ja tutkii niiden soveltuvuutta IoT-ympäristössä. Lisäksi tutkimuksessa kehitettiin simulaatioartefakti, jolla arvioitiin ad hoc -verkkoteknologian kykyä jakaa turvallisuustietoa erikokoisissa IoT-sensoriverkoissa. Tulokset osoittivat ad hoc -verkkoteknologian tukevan turvallisuustiedon tehokasta ja skaalautuvaa jakamista, kapasiteetin, viiveen ja toimintavarmuuden näkökulmista. Verkon fyysinen topologia ja reittien olemassaolo tunnistettiin merkittäväksi tekijöiksi suorituskyvyn kannalta. Tämän tutkimuksen tulokset tarjoavat pohjan ad hoc -verkkoteknologian validoimiseksi viitekehyksenä, jonka päälle voidaan toteuttaa monimutkaisempia, hajautettuja turvallisuustoiminnallisuuksia.
first_indexed 2024-05-30T20:00:59Z
format Pro gradu
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Frantti, Tapio", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Markkanen, Veikko", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2024-05-30T05:37:30Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2024-05-30T05:37:30Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/95346", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Challenges in resource constrained IoT networks are driven by the miniaturization of purpose-specific hardware and the imperative for cost-efficiency. These characteristics make traditional security solutions, which focus on securing individual devices, unrealistic. Instead, decentralized solutions that leverage the collective resources of a network must be considered. For these solutions, key enablers include self-configuration, scalability, resilience to extreme dynamics, and the overall sustainability and reliability of the network, suggesting the ad hoc paradigm, an attractive foundation for development. Therefore, the objective of this master\u2019s thesis is to examine the feasibility of ad hoc networking in providing a reliable communication framework for sharing security information between resource constrained devices. \nThe research consists of the examination of major challenges in resource constrained IoT systems and exploration of promising solutions from academic literature. It details various categories of ad hoc networking, key standards, and routing protocols. Additionally, a simulation artifact was developed to assess the feasibility of using ad hoc networking to distribute security information among resource constrained devices across different network sizes. The findings indicate that ad hoc networking is an efficient and scalable framework for sharing security information in terms of throughput, latency, and the overall reliability of the introduced security functionality. The key factors affecting these values could be identified as the physical topology of the network and the availability of existing routes between nodes. Furthermore, the alignment of ad hoc networking with academically proposed solutions was affirmed. \nThe results from this thesis can provide a reference base for further steps in validating ad hoc networking as a suitable communication framework upon which more complex, decentralized security functionalities can be implemented.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Resurssivajeisten IoT-verkkojen turvallisuushaasteet juontavat juurensa tarkasti rajattuun teht\u00e4v\u00e4\u00e4n suunniteltujen laitteiden optimoinnista kustannustehokkuutta varten. T\u00e4ss\u00e4 ymp\u00e4rist\u00f6ss\u00e4 laitteiden suojaaminen perinteisin, yksitt\u00e4iseen laitteeseen keskittyvin menetelmin, ei ole realistista. Vastuu kyberturvasta tulisi hajauttaa verkon kollektiivisia resursseja hy\u00f6dynt\u00e4en. Hajautettujen menetelmien ytimess\u00e4 on laitteiden kyky muodostaa autonomisia, skaalautuvia ja kest\u00e4vi\u00e4 verkkoja, joiden rakentamiseksi ad hoc -verkkoteknologia tarjoaa hedelm\u00e4llisen perustan. N\u00e4in ollen, t\u00e4m\u00e4n pro gradu -tutkimuksen tavoitteena on kartoittaa ad hoc -verkkoteknologian soveltuvuutta turvallisuustiedon jakamiseen resurssivajeesta k\u00e4rsivien laitteiden kesken. \nTutkimus koostuu IoT-verkoille tyypillisten haasteiden tunnistamisesta, sek\u00e4 akateemisessa kirjallisuudessa esitettyjen ratkaisujen k\u00e4sittelyst\u00e4. Se erittelee ad hoc -verkkojen kategoriat, keskeisi\u00e4 standardeja sek\u00e4 reititysprotokollia, ja tutkii niiden soveltuvuutta IoT-ymp\u00e4rist\u00f6ss\u00e4. Lis\u00e4ksi tutkimuksessa kehitettiin simulaatioartefakti, jolla arvioitiin ad hoc -verkkoteknologian kyky\u00e4 jakaa turvallisuustietoa erikokoisissa IoT-sensoriverkoissa. Tulokset osoittivat ad hoc -verkkoteknologian tukevan turvallisuustiedon tehokasta ja skaalautuvaa jakamista, kapasiteetin, viiveen ja toimintavarmuuden n\u00e4k\u00f6kulmista. Verkon fyysinen topologia ja reittien olemassaolo tunnistettiin merkitt\u00e4v\u00e4ksi tekij\u00f6iksi suorituskyvyn kannalta. \nT\u00e4m\u00e4n tutkimuksen tulokset tarjoavat pohjan ad hoc -verkkoteknologian validoimiseksi viitekehyksen\u00e4, jonka p\u00e4\u00e4lle voidaan toteuttaa monimutkaisempia, hajautettuja turvallisuustoiminnallisuuksia.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2024-05-30T05:37:30Z\r\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2024-05-30T05:37:30Z (GMT). No. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "77", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "CC BY 4.0", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "Sharing Security Information Between Resource Constrained Network Nodes", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202405304109", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Cyber Security", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://creativecommons.org/licenses/by/4.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_95346
language eng
last_indexed 2025-02-18T10:55:56Z
main_date 2024-01-01T00:00:00Z
main_date_str 2024
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/8e25816d-5e2d-42b2-9843-55405ba5bae0\/download","text":"URN:NBN:fi:jyu-202405304109.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2024
record_format qdc
source_str_mv jyx
spellingShingle Markkanen, Veikko Sharing Security Information Between Resource Constrained Network Nodes Cyber Security Kyberturvallisuus
title Sharing Security Information Between Resource Constrained Network Nodes
title_full Sharing Security Information Between Resource Constrained Network Nodes
title_fullStr Sharing Security Information Between Resource Constrained Network Nodes Sharing Security Information Between Resource Constrained Network Nodes
title_full_unstemmed Sharing Security Information Between Resource Constrained Network Nodes Sharing Security Information Between Resource Constrained Network Nodes
title_short Sharing Security Information Between Resource Constrained Network Nodes
title_sort sharing security information between resource constrained network nodes
title_txtP Sharing Security Information Between Resource Constrained Network Nodes
topic Cyber Security Kyberturvallisuus
topic_facet Cyber Security Kyberturvallisuus
url https://jyx.jyu.fi/handle/123456789/95346 http://www.urn.fi/URN:NBN:fi:jyu-202405304109
work_keys_str_mv AT markkanenveikko sharingsecurityinformationbetweenresourceconstrainednetworknodes