Skip to main content

2018 | OriginalPaper | Buchkapitel

An ECC-Based Algorithm to Handle Secure Communication Between Heterogeneous IoT Devices

verfasst von : S. Sasirekha, S. Swamynathan, S. Suganya

Erschienen in: Advances in Electronics, Communication and Computing

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Internet of Things (IoT) is an interconnection of tiny real-world objects using sensor, actuators, and software’s designed for exchanging data and controlling them. It invades business landscape on massive scale integrating heterogeneous devices. Some of the application includes media, environmental monitoring, infrastructure and energy management, medical, healthcare system, and transportation. Earlier, in these applications, the primary issue is handling efficient communication among the interconnected devices to have an extended network lifetime. Nowadays, as data grows rapidly in the IoT, security and privacy is also a major issue to be concentrated in these applications to reduce vulnerabilities. Recent studies show that the existing IP security protocols and algorithm have technical limitation in applying it to the context Internet of Things. In particular, when a new device enters to an existing secured network, the network should ensure that the new device is authenticated and authorized properly with respect to the properties of existing network. Otherwise, similar to other network, IoT network also will be subjected to various attacks such as physical attacks, service disruption attacks, data attacks, and denial-of-service attacks. Hence, in this work, an algorithm to authenticate and authorize when a new device gets added to the existing network is proposed. The algorithm is tested for various attacks and the results are proven to be efficient and secure.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Wang, C., Daneshmand, M., Dohler, M., Mao, X., Hu, R.Q., Wang, H.: Guest editorial—special issue on internet of things (IoT): architecture, protocols and services. IEEE Sens. J. 13(10), 3505–3510 (2013) Wang, C., Daneshmand, M., Dohler, M., Mao, X., Hu, R.Q., Wang, H.: Guest editorial—special issue on internet of things (IoT): architecture, protocols and services. IEEE Sens. J. 13(10), 3505–3510 (2013)
2.
Zurück zum Zitat Ludena, R.D.A., Horibe, N., Ahrary, A., Yang, W.S.: IoT-Security approach analysis for the novel nutrition-based vegetable production and distribution system. In: IIAI 3rd International Conference on Advanced Applied Informatics (2014) Ludena, R.D.A., Horibe, N., Ahrary, A., Yang, W.S.: IoT-Security approach analysis for the novel nutrition-based vegetable production and distribution system. In: IIAI 3rd International Conference on Advanced Applied Informatics (2014)
3.
Zurück zum Zitat Zhang, Z.-K., Cho, M.C.Y., Wang, C.W., Hsu, C.W., Chen, C.K., Shieh, S.: IEEE Fellow: IoT security: ongoing challenges and research opportunities. In: IEEE 7th International Conference on Service-Oriented Computing and Applications (2014) Zhang, Z.-K., Cho, M.C.Y., Wang, C.W., Hsu, C.W., Chen, C.K., Shieh, S.: IEEE Fellow: IoT security: ongoing challenges and research opportunities. In: IEEE 7th International Conference on Service-Oriented Computing and Applications (2014)
4.
Zurück zum Zitat Falk, R., Fries, S.: Managed certificate whitelisting—a basis for internet of things security in industrial automation applications. In: The Eighth International Conference on Emerging Security Information, Systems and Technologies (2014) ISBN: 978-1-61208-376-6 Falk, R., Fries, S.: Managed certificate whitelisting—a basis for internet of things security in industrial automation applications. In: The Eighth International Conference on Emerging Security Information, Systems and Technologies (2014) ISBN: 978-1-61208-376-6
5.
Zurück zum Zitat Kruger, C.P., Hancke, G.P., Implementing the internet of things vision in industrial wireless sensor networks, IEEE (2014) Kruger, C.P., Hancke, G.P., Implementing the internet of things vision in industrial wireless sensor networks, IEEE (2014)
6.
Zurück zum Zitat Kim, D.H., Cho, J.Y., Kim, S., Lim, J.: A Study of developing security requirements for internet of things (IoT). Adv. Sci. Technol. Lett. 87 (Art, Culture, Game, Graphics, Broadcasting and Digital Contents) (2015) Kim, D.H., Cho, J.Y., Kim, S., Lim, J.: A Study of developing security requirements for internet of things (IoT). Adv. Sci. Technol. Lett. 87 (Art, Culture, Game, Graphics, Broadcasting and Digital Contents) (2015)
7.
Zurück zum Zitat Roman, R., Zhou, J., Lopez, J.: On the features and challenges of security and privacy in distributed internet of things. J. Comput. Netw. 57(10) (2013) Roman, R., Zhou, J., Lopez, J.: On the features and challenges of security and privacy in distributed internet of things. J. Comput. Netw. 57(10) (2013)
8.
Zurück zum Zitat Pawlowski, M.P., Jara, A.J., Ogorzalek, M.J.: Extending extensible authentication protocol over IEEE 802.15.4 networks. In: 8th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2014), pp 340–345 (2014) Pawlowski, M.P., Jara, A.J., Ogorzalek, M.J.: Extending extensible authentication protocol over IEEE 802.15.4 networks. In: 8th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2014), pp 340–345 (2014)
9.
Zurück zum Zitat Marin, L., Pawlowski, M.P., Jara, A.: Optimized ECC implementation for secure communication between heterogeneous IoT devices, J. Sens. 15 (2015) Marin, L., Pawlowski, M.P., Jara, A.: Optimized ECC implementation for secure communication between heterogeneous IoT devices, J. Sens. 15 (2015)
10.
Zurück zum Zitat Thangarasu, N.: Implementation secure authentication using elliptic curve cryptography. Int. J. Innovative Res. Adv. Eng. (IJIRAE) 1(1) (2014) Thangarasu, N.: Implementation secure authentication using elliptic curve cryptography. Int. J. Innovative Res. Adv. Eng. (IJIRAE) 1(1) (2014)
11.
Zurück zum Zitat Park, J., Kang, N.: Lightweight secure communication for CoAP-enabled internet of things using delegated DTLS handshake, 978-1-4799-6786-5/14/$31.00 ©2014 IEEE ICTC (2014) Park, J., Kang, N.: Lightweight secure communication for CoAP-enabled internet of things using delegated DTLS handshake, 978-1-4799-6786-5/14/$31.00 ©2014 IEEE ICTC (2014)
12.
Zurück zum Zitat Sarwar, U., Sinniah, G.R., Suryady, Z., Khosdilniat, R.: Architecture for 6LoWPAN mobile communicator system. In: Proceedings of the International MultiConference of Engineers and Computer Scientists 2010 vol. II, IMECS (2010) Sarwar, U., Sinniah, G.R., Suryady, Z., Khosdilniat, R.: Architecture for 6LoWPAN mobile communicator system. In: Proceedings of the International MultiConference of Engineers and Computer Scientists 2010 vol. II, IMECS (2010)
13.
Zurück zum Zitat Ning, H., Liu, H., Yang, L.T.: Aggregated-proof based hierarchical authentication scheme for the internet of things. IEEE Trans. Parallel Distrib. Syst. 26(3) (2015) Ning, H., Liu, H., Yang, L.T.: Aggregated-proof based hierarchical authentication scheme for the internet of things. IEEE Trans. Parallel Distrib. Syst. 26(3) (2015)
14.
Zurück zum Zitat Raza, S., Trabalza, D., Voigt, T.: 6LoWPAN compressed DTLS for CoAP, In: 8th IEEE International Conference on Distributed Computing in Sensor Systems (2012) Raza, S., Trabalza, D., Voigt, T.: 6LoWPAN compressed DTLS for CoAP, In: 8th IEEE International Conference on Distributed Computing in Sensor Systems (2012)
15.
Zurück zum Zitat Yongliang, L., Gao, W., Yao, H., Yu, X.: Elliptic curve cryptography based wireless authentication protocol. Int. J. Netw. Secur. 5(3), 327–337 (2007) Yongliang, L., Gao, W., Yao, H., Yu, X.: Elliptic curve cryptography based wireless authentication protocol. Int. J. Netw. Secur. 5(3), 327–337 (2007)
16.
Zurück zum Zitat Prabhakar, M.: Elliptic curve cryptography in securing networks by mobile authentication, Int. J. Sci. Res Publ. 3(9) (2013) ISSN 2250-3153 Prabhakar, M.: Elliptic curve cryptography in securing networks by mobile authentication, Int. J. Sci. Res Publ. 3(9) (2013) ISSN 2250-3153
17.
Zurück zum Zitat Somani, N.A., Patel, Y.: Zigbee: a Low power wireless technology for industrial applications. Int. J. Control Theor. Comput. Model. (IJCTCM) 2(3) (2012) Somani, N.A., Patel, Y.: Zigbee: a Low power wireless technology for industrial applications. Int. J. Control Theor. Comput. Model. (IJCTCM) 2(3) (2012)
18.
Zurück zum Zitat Serme, G., de Oliveira, A.S., Massiera, J., Roudier, Y.: Enabling Message Security for RESTful Services. In: IEEE 19th International Conference on Web Services (2012) Serme, G., de Oliveira, A.S., Massiera, J., Roudier, Y.: Enabling Message Security for RESTful Services. In: IEEE 19th International Conference on Web Services (2012)
19.
Zurück zum Zitat Lee, S., Jo, J.Y., Kim, Y.: Method for secure RESTful web service IEEE, ICIS 2015 (2015) Lee, S., Jo, J.Y., Kim, Y.: Method for secure RESTful web service IEEE, ICIS 2015 (2015)
20.
Zurück zum Zitat Alanazi, S., Al-Muhtadi, J., Derhab, A., Saleem, K., AlRomi, A.N., Alholaibah, H.S., Rodrigues, J.J.: On resilience of wireless mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications. In: IEEE 17th International Conference on e-Health Networking, Applications and Services (Healthcom) (2015) Alanazi, S., Al-Muhtadi, J., Derhab, A., Saleem, K., AlRomi, A.N., Alholaibah, H.S., Rodrigues, J.J.: On resilience of wireless mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications. In: IEEE 17th International Conference on e-Health Networking, Applications and Services (Healthcom) (2015)
21.
Zurück zum Zitat Martınez, V.G., Encinas, L.H.: Implementing ECC with java standard edition 7. Int. J. Comput. Sci. Artif. Intell. 3(4), 134–142 (2013) Martınez, V.G., Encinas, L.H.: Implementing ECC with java standard edition 7. Int. J. Comput. Sci. Artif. Intell. 3(4), 134–142 (2013)
22.
Zurück zum Zitat Sheng, Z., (Member, IEEE), Mahapatra, C., (Student Member, IEEE), Zhu, C., (Student Member, IEEE)., Leung, V.C.M., (Fellow, IEEE).: Recent advances in industrial wireless sensor networks toward efficient management in IoT, vol. 3, 19 May 2015 Sheng, Z., (Member, IEEE), Mahapatra, C., (Student Member, IEEE), Zhu, C., (Student Member, IEEE)., Leung, V.C.M., (Fellow, IEEE).: Recent advances in industrial wireless sensor networks toward efficient management in IoT, vol. 3, 19 May 2015
23.
Zurück zum Zitat Anggorojati, B., Mahalle, P.N., Prasad, N.R., Prasad, R.: Capability-based access control delegation model on the federated IoT network. IEEE (2012) Anggorojati, B., Mahalle, P.N., Prasad, N.R., Prasad, R.: Capability-based access control delegation model on the federated IoT network. IEEE (2012)
24.
Zurück zum Zitat Hasebe, K., Mabuchi, M., Matsushita, A.: Capability-based delegation model in rbac. In: Proceeding of the 15th ACM symposium on access control models and technologies, ser. SACMAT’10. New York, NY, USA: ACM, pp. 109–118 (2010) Hasebe, K., Mabuchi, M., Matsushita, A.: Capability-based delegation model in rbac. In: Proceeding of the 15th ACM symposium on access control models and technologies, ser. SACMAT’10. New York, NY, USA: ACM, pp. 109–118 (2010)
Metadaten
Titel
An ECC-Based Algorithm to Handle Secure Communication Between Heterogeneous IoT Devices
verfasst von
S. Sasirekha
S. Swamynathan
S. Suganya
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-4765-7_37

Neuer Inhalt