Enhancing Reliability and Security in Resource-Constrained IoT Networks A Middleware-Centric Approach
Keywords:
IoT Security; Resource-Constrained Networks; Middleware; Reliability; Trust; Authentication; Access Control; Energy Efficiency; Edge Computing; Resilience; Cyber-Physical Systems; Data Integrity; Confidentiality.Abstract
The ubiquitous deployment of Internet of Things devices,
particularly within resource-constrained environments,
necessitates the development of robust solutions that
effectively address both reliability and security challenges.
This paper proposes a novel middleware-centric
architectural framework designed to enhance the inherent
limitations of such networks concerning computational
power, memory, and energy. Our approach integrates
comprehensive security and trust mechanisms directly into
the
middleware layer, emphasizing decentralized
authentication, granular access control, and the judicious use
of secure protocols to counter various cyber threats.
Concurrently, the proposed middleware incorporates
strategies aimed at bolstering system reliability through
optimized energy-efficient operations and resilient service
embedding. The methodology details the design principles,
outlines critical implementation considerations, and presents
a rigorous performance evaluation framework. This
framework includes both simulation-based analyses and
real-world testbed experiments, designed to validate the
middleware's efficacy in improving data integrity,
confidentiality, availability, and overall system resilience,
crucially without compromising the operational efficiency
imperative for constrained IoT devices. This work
significantly contributes to bridging the persistent gap
between severe resource limitations and the critical demand
for secure and dependable IoT deployments.
Downloads
Published
Versions
- 2026-02-15 (2)
- 2026-02-09 (1)
