Skip to main content

2019 | OriginalPaper | Buchkapitel

5. An Asymmetric RSA-Based Security Approach for Opportunistic IoT

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Internet of things (IoT) is a technical revolution of the internet where users, computing systems, and daily objects having sensing abilities collaborate to provide innovative services in various application domains. Opportunistic internet of things (OppIoT) is an extension of the opportunistic networks that exploits the interactions between the human-based communities and the IoT devices to increase the network connectivity and reliability. In this context, the security and privacy requirements play a crucial role as the collected information is exposed to a wide unknown audience. Traditional secure routing methods cannot be applied to OppIoT systems due to the lack of fixed path between nodes. Hence, an adaptable infrastructure is required to handle the security threats in dynamic OppIoT environment. This chapter proposes a novel security scheme for OppIoT using RSA-based asymmetric cryptography to secure the network and Markov chain to make prediction about a node’s future location and its corresponding delivery probability. Simulation results convey that the suggested approach ensures security of messages and outperforms the traditional protocols. RSASec is superior to LPFR-MC in terms of correct packet delivery by 19%, message delivery probability by 2.33%, number of messages dropped is reduced by 3.9%, and average latency is 6.76% lower than LPFR-MC.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat L. Atzori, A. Iera, G. Morabito, The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)CrossRef L. Atzori, A. Iera, G. Morabito, The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)CrossRef
2.
Zurück zum Zitat B. Guo, D. Zhang, Z. Wang, Z. Yu, X. Zhou, Opportunistic IoT: exploring the harmonious interaction between human and the internet of things. J. Netw. Comput. Appl. 36(6), 1531–1539 (2013)CrossRef B. Guo, D. Zhang, Z. Wang, Z. Yu, X. Zhou, Opportunistic IoT: exploring the harmonious interaction between human and the internet of things. J. Netw. Comput. Appl. 36(6), 1531–1539 (2013)CrossRef
3.
Zurück zum Zitat D. Airehrour, J. Gutierrez, S.K. Ray, Secure routing for internet of things: a survey. J. Netw. Comput. Appl. 66, 198–213 (2016)CrossRef D. Airehrour, J. Gutierrez, S.K. Ray, Secure routing for internet of things: a survey. J. Netw. Comput. Appl. 66, 198–213 (2016)CrossRef
4.
Zurück zum Zitat Y. Zhang, S. Yuanyu, et al., On secure wireless communications for IoT under eaves-dropper collusion. IEEE Trans. Autom. Sci. Eng. 13(3), 1281–1293 (2016)CrossRef Y. Zhang, S. Yuanyu, et al., On secure wireless communications for IoT under eaves-dropper collusion. IEEE Trans. Autom. Sci. Eng. 13(3), 1281–1293 (2016)CrossRef
5.
Zurück zum Zitat X.-J. Lin, L. Sun, H. Qu, An efficient RSA-based certificateless public key encryption scheme. Discrete Appl. Math. 241, 39–47 (2018)MathSciNetCrossRef X.-J. Lin, L. Sun, H. Qu, An efficient RSA-based certificateless public key encryption scheme. Discrete Appl. Math. 241, 39–47 (2018)MathSciNetCrossRef
6.
Zurück zum Zitat S.K. Dhurandher, S.J. Borah, I. Woungang, A. Bansal, A. Gupta, A location prediction-based routing scheme for opportunistic networks in an IoT scenario, in Proceedings of Elsevier Journal of Parallel and Distributed Computing, 2017 S.K. Dhurandher, S.J. Borah, I. Woungang, A. Bansal, A. Gupta, A location prediction-based routing scheme for opportunistic networks in an IoT scenario, in Proceedings of Elsevier Journal of Parallel and Distributed Computing, 2017
7.
Zurück zum Zitat P.L.R. Chze, K.S. Leong, A secure multi-hop routing for IoT communication, in Internet of Things (WF-IoT), 2014 IEEE World Forum on (IEEE, 2014) P.L.R. Chze, K.S. Leong, A secure multi-hop routing for IoT communication, in Internet of Things (WF-IoT), 2014 IEEE World Forum on (IEEE, 2014)
8.
Zurück zum Zitat X. Anita, J. Martin Leo Manickam, M.A. Bhagyaveni, Two-way acknowledgment-based trust framework for wireless sensor networks. Int. J. Distrib. Sens. Netw. 9(5), 952905 (2013)CrossRef X. Anita, J. Martin Leo Manickam, M.A. Bhagyaveni, Two-way acknowledgment-based trust framework for wireless sensor networks. Int. J. Distrib. Sens. Netw. 9(5), 952905 (2013)CrossRef
9.
Zurück zum Zitat J. Montavont, D. Roth, T. Nol, Mobile IPv6 in internet of things: analysis, experimentations and optimizations. Ad Hoc Netw. 14, 1525 (2014)CrossRef J. Montavont, D. Roth, T. Nol, Mobile IPv6 in internet of things: analysis, experimentations and optimizations. Ad Hoc Netw. 14, 1525 (2014)CrossRef
10.
Zurück zum Zitat D.J. Malan, M. Welsh, M.D. Smith, A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography, in Sensor and Ad Hoc Communications and Networks (IEEE, 2004), p. 7180 D.J. Malan, M. Welsh, M.D. Smith, A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography, in Sensor and Ad Hoc Communications and Networks (IEEE, 2004), p. 7180
11.
Zurück zum Zitat U. Hengartner, P. Steenkiste, Exploiting hierarchical identity-based encryption for access control to pervasive computing information, in SECURECOMM, 2005, p. 384396 U. Hengartner, P. Steenkiste, Exploiting hierarchical identity-based encryption for access control to pervasive computing information, in SECURECOMM, 2005, p. 384396
12.
Zurück zum Zitat L.B. Oliveira, M. Scott, J. Lopez, R. Dahab, TinyPBC: pairings for authenticated identity-based non-interactive key distribution in sensor networks, in INSS, 2008, p. 173180 L.B. Oliveira, M. Scott, J. Lopez, R. Dahab, TinyPBC: pairings for authenticated identity-based non-interactive key distribution in sensor networks, in INSS, 2008, p. 173180
13.
Zurück zum Zitat N. Ye, Y. Zhu, R.-C.B. Wang, R. Malekian, Q.-M. Lin, An efficient authentication and access control scheme for perception layer of internet of things. Appl. Math. Inf. Sci. 8(4), 16171624 (2014)CrossRef N. Ye, Y. Zhu, R.-C.B. Wang, R. Malekian, Q.-M. Lin, An efficient authentication and access control scheme for perception layer of internet of things. Appl. Math. Inf. Sci. 8(4), 16171624 (2014)CrossRef
14.
Zurück zum Zitat K. Graffi, P. Mukherjee, B. Menges, D. Hartung, A. Kovacevic, R. Steinmetz, Practical security in P2P-based social networks, in Proceeding of the IEEE 34th Conference Local Computer Networks, 2009, p. 269272 K. Graffi, P. Mukherjee, B. Menges, D. Hartung, A. Kovacevic, R. Steinmetz, Practical security in P2P-based social networks, in Proceeding of the IEEE 34th Conference Local Computer Networks, 2009, p. 269272
15.
Zurück zum Zitat Z. Jia, X. Lin, S.-H. Tan, L. Li, Y. Yang, Public key distribution scheme for delay tolerant networks based on two-channel cryptography. J. Netw. Comput. Appl. 35(3), 905913 (2012)CrossRef Z. Jia, X. Lin, S.-H. Tan, L. Li, Y. Yang, Public key distribution scheme for delay tolerant networks based on two-channel cryptography. J. Netw. Comput. Appl. 35(3), 905913 (2012)CrossRef
16.
Zurück zum Zitat R. Lu, X. Lin, X. Liang, X. Shen, A secure handshake scheme with symptoms-matching for mHealthcare social network. J. Mobile Netw. Appl. 16(6), 683694 (2011) R. Lu, X. Lin, X. Liang, X. Shen, A secure handshake scheme with symptoms-matching for mHealthcare social network. J. Mobile Netw. Appl. 16(6), 683694 (2011)
17.
Zurück zum Zitat Y. Ding, X.-W. Zhou, Z.-M. Cheng, W.-L. Zeng, Efficient authentication and key agreement protocol with anonymity for delay tolerant networks. Wireless Pers. Commun. 70(4), 14731485 (2013) Y. Ding, X.-W. Zhou, Z.-M. Cheng, W.-L. Zeng, Efficient authentication and key agreement protocol with anonymity for delay tolerant networks. Wireless Pers. Commun. 70(4), 14731485 (2013)
18.
Zurück zum Zitat K. El Defrawy, J. Solis, G. Tsudik, Leveraging social contacts for message confidentiality in delay tolerant networks. in Proceedings of the 33rd Annual IEEE International Computer Software Applications Conference, 2009, p. 271279 K. El Defrawy, J. Solis, G. Tsudik, Leveraging social contacts for message confidentiality in delay tolerant networks. in Proceedings of the 33rd Annual IEEE International Computer Software Applications Conference, 2009, p. 271279
19.
Zurück zum Zitat Y. Gongjun, S. Olariu, M.C. Weigle, Providing location security in vehicular ad hoc networks. IEEE Wireless Commun. 16(6), 4855 (2009) Y. Gongjun, S. Olariu, M.C. Weigle, Providing location security in vehicular ad hoc networks. IEEE Wireless Commun. 16(6), 4855 (2009)
20.
Zurück zum Zitat W. Wang, H. Man, Y. Liu, A framework for intrusion detection systems by social network analysis methods in ad hoc networks. Security Commun. Netw. 2(6), 669685 (2009) W. Wang, H. Man, Y. Liu, A framework for intrusion detection systems by social network analysis methods in ad hoc networks. Security Commun. Netw. 2(6), 669685 (2009)
21.
Zurück zum Zitat L. Qinghua, Z. Sencun, C. Guohong, Routing in socially selfish delay tolerant networks, in Proceeding of the IEEE INFOCOM, 2010, p. 19 L. Qinghua, Z. Sencun, C. Guohong, Routing in socially selfish delay tolerant networks, in Proceeding of the IEEE INFOCOM, 2010, p. 19
22.
Zurück zum Zitat L. Pelusi, A. Passarella, M. Conti, Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. IEEE Commun. Mag. 44(11), 134–141 (2006)CrossRef L. Pelusi, A. Passarella, M. Conti, Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. IEEE Commun. Mag. 44(11), 134–141 (2006)CrossRef
23.
Zurück zum Zitat A. Lindgren, A. Doria, D. Schelen, Probabilistic routing in intermittently connected networks, in Proceeding of ACM SIGMOBILE Mobile Comp. Commun., 2003, pp. 19–20 A. Lindgren, A. Doria, D. Schelen, Probabilistic routing in intermittently connected networks, in Proceeding of ACM SIGMOBILE Mobile Comp. Commun., 2003, pp. 19–20
24.
Zurück zum Zitat A. Keranen, J. Ott, T. Karkkainen, The ONE simulator for DTN protocol evaluation, in Proceeding of 2nd Intl. Conference on Simulation Tools and Techniques (SIMU-Tools’ 09), Rome, Italy, Mar 2–6, 2009, pp. 1–9 A. Keranen, J. Ott, T. Karkkainen, The ONE simulator for DTN protocol evaluation, in Proceeding of 2nd Intl. Conference on Simulation Tools and Techniques (SIMU-Tools’ 09), Rome, Italy, Mar 2–6, 2009, pp. 1–9
Metadaten
Titel
An Asymmetric RSA-Based Security Approach for Opportunistic IoT
verfasst von
Nisha Kandhoul
Sanjay Kumar Dhurandher
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-11437-4_5

Neuer Inhalt