Created at 4am, Jan 7
cyranodbTechnology
1
Internet of Things (IoT) Societal Challenges & Scientific Research Fields for IoT
39GSHX4FOC1hmruqSoE5hEpKIJ2PnOja15D2lX7WZX0
File Type
PDF
Entry Count
232
Embed. Model
jina_embeddings_v2_base_en
Index Type
hnsw

Just as the Internet radically reshaped society, the Internet of Things (IoT) will have an impact on all areas of human life: from our homes, vehicles, workplaces and factories, to our cities and towns, agriculture and healthcare systems. It will also affect all levels of society (individuals, companies and state-level), from urban to rural and the natural world beyond. This makes it essential to have a proper understanding of IoT and the challenges which relate to it. The primary aims of this document are to: • determine the scope of IoT, its origins, current developments and perspectives; • identify the main societal, technical and scientific challenges linked to IoT.

For instance, IoT vendors required to certify their IoT products for safety infrequently update software on these products. Users, on the other hand, may wish to update the software more often, e.g. to gain functionalities. Reports have shown how such tensions have already produced unfortunate situations where users resort to pirated IoT software (!) which only complicates matters. 47 48 PART II _ Fields of Research for IoT Cryptology 2.4 for Low-end IoT Cryptography provides the fundamental protocols and basic algorithms (primitives) for authentication, identification, and encryption on which all secure systems are built.
id: 544e763757a5588d3204e6d312b5ea5e - page: 49
Cryptographers have decades of experience in the design and analysis of efficient cryptosystems and protocols for relatively powerful devices (such as PCs, servers or smartphones) on one hand, and for more constrained devices such as smart cards on the other. The rise of IoT, with ubiquitous interconnected low-power devices, brings a fascinating new challenge for cryptographers, as it mixes the application requirements of the PC paradigm with the hard physical constraints of low-end devices. Put simply, we know how to provide some security for microcontrollers on smart cards, but smart cards were never meant to be connected to the Internet; and we know how to provide Internet security for powerful processors, but not on a stringent low-energy budget. The challenge for cryptographers is to develop full-strength primitives operating within the special constraints and requirements of the IoT paradigm.
id: da382c67a5510c84a6e3c7a54c7a140b - page: 50
Cryptographic Primitives for Secure IoT Communications High-performance, high-security cryptographic primitives are now standardized, and widely deployed in protocol suites such as TLS (Transport Layer Security) for secure Internet communication. However, these algorithms have traditionally been developed and optimized for higher-powered platforms: from servers and PCs down to smartphones. When we move to more limited low-end IoT devices, the resource constraints are tightened to the point where conventional primitives are often too costly for the device in question. A critical challenge is thus the development, optimisation and adoption of alternative cryptographic primitives providing adequate building blocks for secure, low-power IoT communications.
id: 1eb15ea5fbf8b764ff3e392c6f0cc0d2 - page: 50
Symmetric & Asymmetric Cryptographic Primitives Cryptographic primitives are divided into two fundamental classes, symmetric and asymmetric, according to the function and application of the primitive. Data encryption and data authentication, for example, are symmetric primitives; 2.4_Cryptology for Low-end IoT key exchange and signatures are asymmetric primitives. In general, symmetric primitives have much higher throughput and lower resource consumption. On the other hand, asymmetric primitives offer essential functionalities (such as digital signatures) that symmetric cryptography is literally incapable of providing. But these asymmetric primitives come at the inevitable cost of comparatively bigger keys, larger internal states, and more intensive computations, with the time, memory, and battery requirements that they entail. Optimized symmetric and asymmetric cryptography are both needed for secure IoT communication in practice.
id: 3e30da4d0caa08b89b9e4d9baad26c55 - page: 50
How to Retrieve?
# Search

curl -X POST "https://search.dria.co/hnsw/search" \
-H "x-api-key: <YOUR_API_KEY>" \
-H "Content-Type: application/json" \
-d '{"rerank": true, "top_n": 10, "contract_id": "39GSHX4FOC1hmruqSoE5hEpKIJ2PnOja15D2lX7WZX0", "query": "What is alexanDRIA library?"}'
        
# Query

curl -X POST "https://search.dria.co/hnsw/query" \
-H "x-api-key: <YOUR_API_KEY>" \
-H "Content-Type: application/json" \
-d '{"vector": [0.123, 0.5236], "top_n": 10, "contract_id": "39GSHX4FOC1hmruqSoE5hEpKIJ2PnOja15D2lX7WZX0", "level": 2}'