Security and privacy in ubiquitous IT services

What?

Innovative protocols and solutions to address the key challenges of secure IT and Internet of Things (IoT). Several innovative security protocols were developed which form the basis for secure electronic communication and enable a safe and, consequentially, privacy oriented IoT. These security protocols address the majority of security challenges, including authentication, confidentiality and integrity. At the same time, they demand less computational and communication resources than existing solutions.

Problem

Mobile and ubiquitous solutions and services are influencing our daily lives greatly. Tightly related is the concept of the IoT which makes devices, solutions and services much more diverse. New ways and areas of application have emerged and, thus, also provoked new challenges/problems in the field of Information Security.

Additionally, security and privacy also include societal aspects, not only technical ones. More precisely, today’s societies are increasingly more mobile and internationalized, which also demand new multicultural and multilingual skills.

Goals

  1. Create security protocols that are secure in regard to well-established security requirements and demand less resource in respect to computational and communication cost.
  2. Create privacy-aware mutual authentication protocols compatible with specific restrictions.
  3. Present a systematic and comprehensive overview of the security and privacy aspects of the IoT, as well as the challenges and open problems related to the IoT.
  4. Identify skills of cultural awareness in order to incorporate the cultural component into the specific scientific area.

Solution

The developed security protocols form the basis for secure electronic communication and enable a safe and, consequentially, privacy oriented IoT. These security protocols address the majority of security requirements, including authentication, confidentiality and integrity. At the same time, they demand less computational and communication resources than existing solutions, and are, therefore, well-suited for practical application scenarios.

Additionally, an innovative privacy-aware mutual authentication protocol compatible with specific restrictions has been developed which demonstrates that privacy in the IoT can be achieved without proprietary protocols and on the basis of existing Internet standards.

The research also resulted in an overview of the security and privacy aspects of the IoT, as well as the challenges and open problems related to the IoT. The key challenges in the research field are provoked by the ubiquity and the type of data collected and processed – sensitive data, e.g. location data, patient data.

In scope of the research a list of cultural awareness skills was identified that incorporate the cultural component into this specific area of security and privacy in IoT. In this way, aspects of security and privacy can profit.

Authors

Asst. Prof. Dr. Marko Hölbl, Prof. Dr. Tatjana Welzer, Dr. Lili Nemec Zlatolas

Comments are closed