Abstract
Wireless Sensor Networks (WSNs) have recently gained more importance as key building blocks for the Internet of Things (IoT); a network infrastructure which has greatly increased in number of connected objects with instantaneous communication, data processing and pervasive access to the objects that we manipulate daily. However, WSNs may sometimes need to be deployed in an opportunistic fashion when there is no network with stable power supply available to support the dissemination of the sensor readings from their collection points to a gateway. For such deployments, traditional networking paradigms may fall short to secure the WSNs since most of the well-known security algorithms have been designed for the traditional high quality of service and fully connected networks. Building around some of the security algorithms and protocols which have been developed in the context of Delay Tolerant Networking, this paper presents a multi-layered security model for the opportunistic IoT. The model combines a hash based message authentication code (HMAC) algorithm implemented at the application layer of the IEEE 802.15.4 stack and an Access Control List (ACL) based identity based encryption algorithm used by the IEEE 802.15.4 MAC layer as a new and novel method of signing and authenticating data which is stored and forwarded on an opportunistic Internet of Things (IoT) infrastructure.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Pelusi, L., Passarella, A., Conti, M.: Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. IEEE Commun. Mag. 44(11), 134–141 (2006)
Kaps, J.-P.: Cryptography for ultra-low power devices, Ph.D. thesis, Worcester Polytechnic Institute (2006)
Aumasson, J.P., Henzen, L., Meier, W., Naya-Plasencia, M.: Quark: a lightweight hash. J. Cryptol. 26(2), 313–339 (2013)
Padmavathi, G.: A survey of attacks, security mechanisms and challenges in wireless sensor. Networks 4(1), 1–9 (2009)
Mandava, M., Lubamba, C., Ismail, A., Bagula, H., Bagula, A.: Cyber-healthcare for public healthcare in the developing world. In: Proceedings of the 2016 IEEE Symposium on Computers and Communication (ISCC), Messina-Italy, 27–30 June 2016, pp. 14–19 (2016)
Bagula, M., Bagula, H., Mandava, M., Kakoko, C., Bagula, A.: Cyber-healthcare kiosks for healthcare support in developing countries. In: Proceedings of the AFRICOMM 2018, Dakar-Senegal, 29–30 November 2018
Celesti, A., et al.: How to develop IoT cloud e-health systems based on FIWARE: a lesson learnt. J. Sens. Actuator Netw. 8(1), 7 (2019)
Bagula, A., Mandava, M., Bagula, H.: A framework for healthcare support in the rural and low income areas of the developing world. J. Netw. Comput. Appl. 120, 17–29 (2018). https://doi.org/10.1016/j.jnca.2018.06.010
Bagula, A., Lubamba, C., Mandava, M., Bagula, H., Zennaro, M., Pietrosemoli, E.: Cloud based patient prioritization as service in public health care. In: 2016 ITU Kaleidoscope: ICTs for a Sustainable World (ITU WT), pp. 1–8. IEEE (2016)
Lubamba, C., Bagula, A.: Cyber-healthcare cloud computing interoperability using the HL7-CDA standard. In: 2017 IEEE Symposium on Computers and Communications (ISCC), pp. 105–110. IEEE, July 2017
Murillo, M.J., Aukin, M.: Application of wireless sensor nodes to a delay-tolerant health and environmental data communication system in remote communities. In: Proceedings of the 2011 IEEE Global Humanitarian Technology Conference, pp. 383–392, October 2011
Kate, A., Zaverucha, G.M., Hengartner, U.: Anonymity and security in delay tolerant networks. In: Proceedings of the 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007, pp. 504–513 (2007)
Seth, A., Keshav, S.: Practical security for disconnected nodes. In: Proceedings of the 1st IEEE ICNP Workshop on Secure Network Protocols, pp. 31–36 (2005)
Sastry, N., Wagner, D.: Security considerations for IEEE 802.15.4 networks. In: Proceedings of the 2004 ACM Workshop on Wireless security - WiSe 2004 (2004)
Bagula, A.B.: Modelling and implementation of QoS in wireless sensor networks: a multi-constrained traffic engineering model. EURASIP J. Wirel. Commun. Netw. 1, 1–14 (2010)
Bagula, A.B.: Hybrid traffic engineering: the least path interference algorithm. In: Proceedings of the 2004 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, pp. 89–96, South African Institute of Computer Scientists and Information Technologists (2004)
Bagula, A.B.: Hybrid routing in next generation IP networks. Comput. Commun. 29(7), 879–892 (2006)
Bagula, A.B.: On achieveing bandwidth-aware LSP/LambdaSP multiplexing/separation in multi-layer networks. IEEE J. Sel. Areas Commun. 25, 987–1000 (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Bagula, A., Ngaqwazai, L., Kakoko, C.L., Ajayi, O. (2020). On the Relevance of Using Multi-layered Security in the Opportunistic Internet-of-Things. In: Zitouni, R., Agueh, M., Houngue, P., Soude, H. (eds) e-Infrastructure and e-Services for Developing Countries. AFRICOMM 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 311. Springer, Cham. https://doi.org/10.1007/978-3-030-41593-8_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-41593-8_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-41592-1
Online ISBN: 978-3-030-41593-8
eBook Packages: Computer ScienceComputer Science (R0)