Skip to main content

2019 | OriginalPaper | Buchkapitel

A Novel, Lightweight, and Cost-Effective Mechanism to Secure the Sensor-Gateway Communication in IoT

verfasst von : Shamshekhar S. Patil, N. R. Sunitha

Erschienen in: Cybernetics and Algorithms in Intelligent Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Ensuring highest degree of resistance against potential adversaries in Internet-of-Thing (IoT) is still an open challenge, and the prime reason behind this is the computational complexities associated with designing security algorithms and its corresponding transformation between the cloud and Wireless Sensor Network (WSN) via gateway node. Hence, the proposed system develops a lightweight and highly responsive encryption technique to offer minimal resource consumption from the resource-constraint sensor nodes. The significant contribution is also to introduce a novel bootstrapping key mechanism with the unique generation of the secret key to maintain both forward and backward secrecy. The study outcome shows that proposed system is highly practical to offer reduced resource consumption and faster algorithm processing time in the presence of dynamic scenario of IoT.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Dawson, M., Eltayeb, M., Omar, M.: Security Solutions for Hyperconnectivity and the Internet of Things. IGI Global, Hershey (2016) Dawson, M., Eltayeb, M., Omar, M.: Security Solutions for Hyperconnectivity and the Internet of Things. IGI Global, Hershey (2016)
2.
Zurück zum Zitat Gravina, R., Palau, C.E., Manso, M., Liotta, A., Fortino, G.: Integration, Interconnection, and Interoperability of IoT Systems. Springer (2017) Gravina, R., Palau, C.E., Manso, M., Liotta, A., Fortino, G.: Integration, Interconnection, and Interoperability of IoT Systems. Springer (2017)
3.
Zurück zum Zitat Khan, S., Pathan, A.S.K., Alrajeh, N.A.: Wireless Sensor Networks: Current Status and Future Trends. CRC Press, Boca Raton (2016) Khan, S., Pathan, A.S.K., Alrajeh, N.A.: Wireless Sensor Networks: Current Status and Future Trends. CRC Press, Boca Raton (2016)
4.
Zurück zum Zitat Selmic, R.R., Phoha, V.V., Serwadda, A.: Wireless Sensor Networks: Security, Coverage, and Localization. Springer (2016)CrossRef Selmic, R.R., Phoha, V.V., Serwadda, A.: Wireless Sensor Networks: Security, Coverage, and Localization. Springer (2016)CrossRef
5.
Zurück zum Zitat Gilchrist, A.: IoT Security Issues. Walter de Gruyter GmbH (2016) Gilchrist, A.: IoT Security Issues. Walter de Gruyter GmbH (2016)
6.
Zurück zum Zitat Riddle, A.R., Chung, S.M.: A survey on the security of hypervisors in cloud computing. In: 2015 IEEE 35th International Conference on Distributed Computing Systems Workshops, Columbus, OH, pp. 100–104 (2015) Riddle, A.R., Chung, S.M.: A survey on the security of hypervisors in cloud computing. In: 2015 IEEE 35th International Conference on Distributed Computing Systems Workshops, Columbus, OH, pp. 100–104 (2015)
7.
Zurück zum Zitat He, D., Zeadally, S., Kumar, N., Wu, W.: Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures. IEEE Trans. Inf. Forensics Secur. 11(9), 2052–2064 (2016)CrossRef He, D., Zeadally, S., Kumar, N., Wu, W.: Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures. IEEE Trans. Inf. Forensics Secur. 11(9), 2052–2064 (2016)CrossRef
8.
Zurück zum Zitat Krejčí, R., Hujňák, O., Švepeš, M.: Security survey of the IoT wireless protocols. In: 2017 25th Telecommunication Forum (TELFOR), Belgrade, Serbia, pp. 1–4 (2017) Krejčí, R., Hujňák, O., Švepeš, M.: Security survey of the IoT wireless protocols. In: 2017 25th Telecommunication Forum (TELFOR), Belgrade, Serbia, pp. 1–4 (2017)
9.
Zurück zum Zitat Shim, K.A.: A survey of public-key cryptographic primitives in wireless sensor networks. IEEE Commun. Surv. Tutor. 18(1), 577–601 (2016)CrossRef Shim, K.A.: A survey of public-key cryptographic primitives in wireless sensor networks. IEEE Commun. Surv. Tutor. 18(1), 577–601 (2016)CrossRef
10.
Zurück zum Zitat Kiviharju, M.: On the fog of RSA key lengths: verifying public key cryptography strength recommendations. In: 2017 International Conference on Military Communications and Information Systems (ICMCIS), Oulu, pp. 1–8 (2017) Kiviharju, M.: On the fog of RSA key lengths: verifying public key cryptography strength recommendations. In: 2017 International Conference on Military Communications and Information Systems (ICMCIS), Oulu, pp. 1–8 (2017)
11.
Zurück zum Zitat Wang, J., Hong, Z., Zhang, Y., Jin, Y.: Enabling security-enhanced attestation with Intel SGX for remote terminal and IoT. IEEE Trans. Comput. Aided Des. Integr. Circ. Syst. 37(1), 88–96 (2018)CrossRef Wang, J., Hong, Z., Zhang, Y., Jin, Y.: Enabling security-enhanced attestation with Intel SGX for remote terminal and IoT. IEEE Trans. Comput. Aided Des. Integr. Circ. Syst. 37(1), 88–96 (2018)CrossRef
12.
Zurück zum Zitat Dao, N.N., Kim, Y., Jeong, S., Park, M., Cho, S.: Achievable multi-security levels for lightweight IoT-enabled devices in infrastructureless peer-aware communications. IEEE Access 5, 26743–26753 (2017)CrossRef Dao, N.N., Kim, Y., Jeong, S., Park, M., Cho, S.: Achievable multi-security levels for lightweight IoT-enabled devices in infrastructureless peer-aware communications. IEEE Access 5, 26743–26753 (2017)CrossRef
13.
Zurück zum Zitat Hossain, M.S., Muhammad, G., Rahman, S.M.M., Abdul, W., Alelaiwi, A., Alamri, A.: Toward end-to-end biomet rics-based security for IoT infrastructure. IEEE Wirel. Commun. 23(5), 44–51 (2016)CrossRef Hossain, M.S., Muhammad, G., Rahman, S.M.M., Abdul, W., Alelaiwi, A., Alamri, A.: Toward end-to-end biomet rics-based security for IoT infrastructure. IEEE Wirel. Commun. 23(5), 44–51 (2016)CrossRef
14.
Zurück zum Zitat Tiburski, R.T., Amaral, L.A., de Matos, E., de Azevedo, D.F.G., Hessel, F.: The role of lightweight approaches towards the standardization of a security architecture for IoT middleware systems. IEEE Commun. Mag. 54(12), 56–62 (2016)CrossRef Tiburski, R.T., Amaral, L.A., de Matos, E., de Azevedo, D.F.G., Hessel, F.: The role of lightweight approaches towards the standardization of a security architecture for IoT middleware systems. IEEE Commun. Mag. 54(12), 56–62 (2016)CrossRef
15.
Zurück zum Zitat Xu, Q., Ren, P., Song, H., Du, Q.: Security enhancement for IoT communications exposed to eavesdroppers with uncertain locations. IEEE Access 4, 2840–2853 (2016)CrossRef Xu, Q., Ren, P., Song, H., Du, Q.: Security enhancement for IoT communications exposed to eavesdroppers with uncertain locations. IEEE Access 4, 2840–2853 (2016)CrossRef
16.
Zurück zum Zitat Giuliano, R., Mazzenga, F., Neri, A., Vegni, A.M.: Security access protocols in IoT capillary networks. IEEE Internet Things J. 4(3), 645–657 (2017)CrossRef Giuliano, R., Mazzenga, F., Neri, A., Vegni, A.M.: Security access protocols in IoT capillary networks. IEEE Internet Things J. 4(3), 645–657 (2017)CrossRef
17.
Zurück zum Zitat Cheng, S.M., Chen, P.Y., Lin, C.C., Hsiao, H.C.: Traffic-aware patching for cyber security in mobile IoT. IEEE Commun. Mag. 55(7), 29–35 (2017)CrossRef Cheng, S.M., Chen, P.Y., Lin, C.C., Hsiao, H.C.: Traffic-aware patching for cyber security in mobile IoT. IEEE Commun. Mag. 55(7), 29–35 (2017)CrossRef
18.
Zurück zum Zitat Sedjelmaci, H., Senouci, S.M., Taleb, T.: An accurate security game for low-resource IoT devices. IEEE Trans. Veh. Technol. 66(10), 9381–9393 (2017)CrossRef Sedjelmaci, H., Senouci, S.M., Taleb, T.: An accurate security game for low-resource IoT devices. IEEE Trans. Veh. Technol. 66(10), 9381–9393 (2017)CrossRef
19.
Zurück zum Zitat Chin, W.L., Li, W., Chen, H.H.: Energy big data security threats in IoT-based smart grid communications. IEEE Commun. Mag. 55(10), 70–75 (2017)CrossRef Chin, W.L., Li, W., Chen, H.H.: Energy big data security threats in IoT-based smart grid communications. IEEE Commun. Mag. 55(10), 70–75 (2017)CrossRef
20.
Zurück zum Zitat Trappe, W., Howard, R., Moore, R.S.: Low-energy security: limits and opportunities in the Internet of Things. IEEE Secur. Priv. 13(1), 14–21 (2015)CrossRef Trappe, W., Howard, R., Moore, R.S.: Low-energy security: limits and opportunities in the Internet of Things. IEEE Secur. Priv. 13(1), 14–21 (2015)CrossRef
21.
Zurück zum Zitat Kumar, S.D., Thapliyal, H., Mohammad, A.: FinSAL: FinFET-based secure adiabatic logic for energy-efficient and DPA resistant IoT devices. IEEE Trans. Comput. Aided Des. Integr. Circ. Syst. 37(1), 110–122 (2018)CrossRef Kumar, S.D., Thapliyal, H., Mohammad, A.: FinSAL: FinFET-based secure adiabatic logic for energy-efficient and DPA resistant IoT devices. IEEE Trans. Comput. Aided Des. Integr. Circ. Syst. 37(1), 110–122 (2018)CrossRef
22.
Zurück zum Zitat Wolf, M., Serpanos, D.: Safety and security in cyber-physical systems and Internet-of-Things systems. Proc. IEEE 106(1), 9–20 (2018)CrossRef Wolf, M., Serpanos, D.: Safety and security in cyber-physical systems and Internet-of-Things systems. Proc. IEEE 106(1), 9–20 (2018)CrossRef
23.
Zurück zum Zitat Burg, A., Chattopadhyay, A., Lam, K.Y.: Wireless communication and security issues for cyber-physical systems and the Internet-of-Things. Proc. IEEE 106(1), 38–60 (2018)CrossRef Burg, A., Chattopadhyay, A., Lam, K.Y.: Wireless communication and security issues for cyber-physical systems and the Internet-of-Things. Proc. IEEE 106(1), 38–60 (2018)CrossRef
24.
Zurück zum Zitat Ruan, O., Chen, J., Zhang, M.: Provably leakage-resilient password-based authenticated key exchange in the standard model. IEEE Access 5, 26832–26841 (2017)CrossRef Ruan, O., Chen, J., Zhang, M.: Provably leakage-resilient password-based authenticated key exchange in the standard model. IEEE Access 5, 26832–26841 (2017)CrossRef
25.
Zurück zum Zitat López, A.B.O., Encinas, L.H., Muñoz, A.M., Vitini, F.M.: A lightweight pseudorandom number generator for securing the Internet of Things. IEEE Access 5, 27800–27806 (2017)CrossRef López, A.B.O., Encinas, L.H., Muñoz, A.M., Vitini, F.M.: A lightweight pseudorandom number generator for securing the Internet of Things. IEEE Access 5, 27800–27806 (2017)CrossRef
26.
Zurück zum Zitat Mohsin, M., Sardar, M.U., Hasan, O., Anwar, Z.: IoTRiskAnalyzer: a probabilistic model checking based framework for formal risk analytics of the Internet of Things. IEEE Access 5, 5494–5505 (2017)CrossRef Mohsin, M., Sardar, M.U., Hasan, O., Anwar, Z.: IoTRiskAnalyzer: a probabilistic model checking based framework for formal risk analytics of the Internet of Things. IEEE Access 5, 5494–5505 (2017)CrossRef
27.
Zurück zum Zitat Xu, G., Cao, Y., Ren, Y., Li, X., Feng, Z.: Network security situation awareness based on semantic ontology and user-defined rules for Internet of Things. IEEE Access 5, 21046–21056 (2017)CrossRef Xu, G., Cao, Y., Ren, Y., Li, X., Feng, Z.: Network security situation awareness based on semantic ontology and user-defined rules for Internet of Things. IEEE Access 5, 21046–21056 (2017)CrossRef
28.
Zurück zum Zitat Ambrosin, M., et al.: On the feasibility of attribute-based encryption on Internet of Things devices. IEEE Micro 36(6), 25–35 (2016)CrossRef Ambrosin, M., et al.: On the feasibility of attribute-based encryption on Internet of Things devices. IEEE Micro 36(6), 25–35 (2016)CrossRef
29.
Zurück zum Zitat Premnath, S.N., Haas, Z.J.: Security and privacy in the Internet-of-Things under time-and-budget-limited adversary model. IEEE Wirel. Commun. Lett. 4(3), 277–280 (2015)CrossRef Premnath, S.N., Haas, Z.J.: Security and privacy in the Internet-of-Things under time-and-budget-limited adversary model. IEEE Wirel. Commun. Lett. 4(3), 277–280 (2015)CrossRef
30.
Zurück zum Zitat Ko, H., Jin, J., Keoh, S.L.: Secure service virtualization in IoT by dynamic service dependency verification. IEEE Internet Things J. 3(6), 1006–1014 (2016)CrossRef Ko, H., Jin, J., Keoh, S.L.: Secure service virtualization in IoT by dynamic service dependency verification. IEEE Internet Things J. 3(6), 1006–1014 (2016)CrossRef
31.
Zurück zum Zitat Zhao, G., Si, X., Wang, J., Long, X., Hu, T.: A novel mutual authentication scheme for Internet of Things. In: Proceedings of 2011 International Conference on Modelling, Identification and Control, Shanghai, pp. 563–566 (2011) Zhao, G., Si, X., Wang, J., Long, X., Hu, T.: A novel mutual authentication scheme for Internet of Things. In: Proceedings of 2011 International Conference on Modelling, Identification and Control, Shanghai, pp. 563–566 (2011)
Metadaten
Titel
A Novel, Lightweight, and Cost-Effective Mechanism to Secure the Sensor-Gateway Communication in IoT
verfasst von
Shamshekhar S. Patil
N. R. Sunitha
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-319-91192-2_40