End-to-end security in the IoT computing continuum: Perspectives in the SWAMP Project

João H. Kleinschmidt, Carlos Kamienski, Ronaldo C. Prati, Kari Kolehmainen, Cristiano Aguzzi

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    8 Citations (Scopus)

    Abstract

    The use of the Internet of Things (IoT) and other related technologies in precision irrigation for agriculture may optimize the use of water, reduce energy consumption, and improve the quality of crops. The SWAMP project is implementing IoT in this domain in four pilots in Europe and Brazil, where heterogeneous devices and distributed components form an IoT Computing Continuum. The security of IoT systems is a challenging task, as these systems present distinctive characteristics when compared to traditional cloud-based systems. Approaches to secure data generated in the sensors until the user's application is a challenging task. This paper discusses how the SWAMP project is dealing with end-to-end security and technologies for the application of IoT in agriculture.

    Original languageEnglish
    Title of host publication2019 9th Latin-American Symposium on Dependable Computing, LADC 2019 - Proceedings
    PublisherIEEE Institute of Electrical and Electronic Engineers
    ISBN (Electronic)978-1-72816-622-3
    DOIs
    Publication statusPublished - Nov 2019
    MoE publication typeA4 Article in a conference publication
    Event9th Latin-American Symposium on Dependable Computing, LADC 2019 - Natal, Brazil
    Duration: 19 Nov 201921 Nov 2019

    Conference

    Conference9th Latin-American Symposium on Dependable Computing, LADC 2019
    Country/TerritoryBrazil
    CityNatal
    Period19/11/1921/11/19

    Keywords

    • Internet of Things
    • IoT Computing Continuum
    • Security
    • Smart Water Management

    Fingerprint

    Dive into the research topics of 'End-to-end security in the IoT computing continuum: Perspectives in the SWAMP Project'. Together they form a unique fingerprint.

    Cite this