Skip to main content

On the Relevance of Using Multi-layered Security in the Opportunistic Internet-of-Things

  • Conference paper
  • First Online:
e-Infrastructure and e-Services for Developing Countries (AFRICOMM 2019)

Abstract

Wireless Sensor Networks (WSNs) have recently gained more importance as key building blocks for the Internet of Things (IoT); a network infrastructure which has greatly increased in number of connected objects with instantaneous communication, data processing and pervasive access to the objects that we manipulate daily. However, WSNs may sometimes need to be deployed in an opportunistic fashion when there is no network with stable power supply available to support the dissemination of the sensor readings from their collection points to a gateway. For such deployments, traditional networking paradigms may fall short to secure the WSNs since most of the well-known security algorithms have been designed for the traditional high quality of service and fully connected networks. Building around some of the security algorithms and protocols which have been developed in the context of Delay Tolerant Networking, this paper presents a multi-layered security model for the opportunistic IoT. The model combines a hash based message authentication code (HMAC) algorithm implemented at the application layer of the IEEE 802.15.4 stack and an Access Control List (ACL) based identity based encryption algorithm used by the IEEE 802.15.4 MAC layer as a new and novel method of signing and authenticating data which is stored and forwarded on an opportunistic Internet of Things (IoT) infrastructure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Pelusi, L., Passarella, A., Conti, M.: Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. IEEE Commun. Mag. 44(11), 134–141 (2006)

    Google Scholar 

  2. Kaps, J.-P.: Cryptography for ultra-low power devices, Ph.D. thesis, Worcester Polytechnic Institute (2006)

    Google Scholar 

  3. Aumasson, J.P., Henzen, L., Meier, W., Naya-Plasencia, M.: Quark: a lightweight hash. J. Cryptol. 26(2), 313–339 (2013)

    Article  MathSciNet  Google Scholar 

  4. Padmavathi, G.: A survey of attacks, security mechanisms and challenges in wireless sensor. Networks 4(1), 1–9 (2009)

    MathSciNet  Google Scholar 

  5. Mandava, M., Lubamba, C., Ismail, A., Bagula, H., Bagula, A.: Cyber-healthcare for public healthcare in the developing world. In: Proceedings of the 2016 IEEE Symposium on Computers and Communication (ISCC), Messina-Italy, 27–30 June 2016, pp. 14–19 (2016)

    Google Scholar 

  6. Bagula, M., Bagula, H., Mandava, M., Kakoko, C., Bagula, A.: Cyber-healthcare kiosks for healthcare support in developing countries. In: Proceedings of the AFRICOMM 2018, Dakar-Senegal, 29–30 November 2018

    Google Scholar 

  7. Celesti, A., et al.: How to develop IoT cloud e-health systems based on FIWARE: a lesson learnt. J. Sens. Actuator Netw. 8(1), 7 (2019)

    Article  Google Scholar 

  8. Bagula, A., Mandava, M., Bagula, H.: A framework for healthcare support in the rural and low income areas of the developing world. J. Netw. Comput. Appl. 120, 17–29 (2018). https://doi.org/10.1016/j.jnca.2018.06.010

    Article  Google Scholar 

  9. Bagula, A., Lubamba, C., Mandava, M., Bagula, H., Zennaro, M., Pietrosemoli, E.: Cloud based patient prioritization as service in public health care. In: 2016 ITU Kaleidoscope: ICTs for a Sustainable World (ITU WT), pp. 1–8. IEEE (2016)

    Google Scholar 

  10. Lubamba, C., Bagula, A.: Cyber-healthcare cloud computing interoperability using the HL7-CDA standard. In: 2017 IEEE Symposium on Computers and Communications (ISCC), pp. 105–110. IEEE, July 2017

    Google Scholar 

  11. Murillo, M.J., Aukin, M.: Application of wireless sensor nodes to a delay-tolerant health and environmental data communication system in remote communities. In: Proceedings of the 2011 IEEE Global Humanitarian Technology Conference, pp. 383–392, October 2011

    Google Scholar 

  12. Kate, A., Zaverucha, G.M., Hengartner, U.: Anonymity and security in delay tolerant networks. In: Proceedings of the 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007, pp. 504–513 (2007)

    Google Scholar 

  13. Seth, A., Keshav, S.: Practical security for disconnected nodes. In: Proceedings of the 1st IEEE ICNP Workshop on Secure Network Protocols, pp. 31–36 (2005)

    Google Scholar 

  14. Sastry, N., Wagner, D.: Security considerations for IEEE 802.15.4 networks. In: Proceedings of the 2004 ACM Workshop on Wireless security - WiSe 2004 (2004)

    Google Scholar 

  15. Bagula, A.B.: Modelling and implementation of QoS in wireless sensor networks: a multi-constrained traffic engineering model. EURASIP J. Wirel. Commun. Netw. 1, 1–14 (2010)

    Google Scholar 

  16. Bagula, A.B.: Hybrid traffic engineering: the least path interference algorithm. In: Proceedings of the 2004 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, pp. 89–96, South African Institute of Computer Scientists and Information Technologists (2004)

    Google Scholar 

  17. Bagula, A.B.: Hybrid routing in next generation IP networks. Comput. Commun. 29(7), 879–892 (2006)

    Article  Google Scholar 

  18. Bagula, A.B.: On achieveing bandwidth-aware LSP/LambdaSP multiplexing/separation in multi-layer networks. IEEE J. Sel. Areas Commun. 25, 987–1000 (2007)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Antoine Bagula .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bagula, A., Ngaqwazai, L., Kakoko, C.L., Ajayi, O. (2020). On the Relevance of Using Multi-layered Security in the Opportunistic Internet-of-Things. In: Zitouni, R., Agueh, M., Houngue, P., Soude, H. (eds) e-Infrastructure and e-Services for Developing Countries. AFRICOMM 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 311. Springer, Cham. https://doi.org/10.1007/978-3-030-41593-8_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-41593-8_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-41592-1

  • Online ISBN: 978-3-030-41593-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics