Skip to main content

An IoT Simulator Tool for Provisioning Secure and Dynamic User-centric Services

  • Conference paper
  • First Online:
Internet of Things – ICIOT 2022 (ICIOT 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13735))

Included in the following conference series:

  • 358 Accesses

Abstract

User-centric service provisioning for IoT applications currently faces a challenge, where existing frameworks consider security provisioning as a one-size-fits-all paradigm. The user’s preferences on parameters like QoS and security are dynamic and change over time, while the strength of service security also inversely affects QoS. This paper builds upon our previously proposed framework, for secure and dynamic user-centric service provisioning for IoT applications, by implementing it on an IoT application simulation tool, CupCarbon. To achieve this, an extensive survey on lightweight security protocols like Trivium, Ascon, and NtruEncrypt specifically designed for IoT systems, with performance evaluation based on metrics like key generation time, encryption and decryption time, and latency values was carried out. The most efficient protocol (NtruEncrypt), was integrated into the CupCarbon simulator as an IoT application use-case scenario, and its performance compared with CupCarbon’s default security protocol - Blowfish. Analysis show NtruEncrypt has better simulation latency compared to Blowfish. Using the modified version of the CupCarbon simulator tool, researchers can model real-life user-centric IoT service provisioning scenarios where security can be provisioned as a dynamic parameter.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    www.oracle.com/in/internet-of-things/what-is-iot/.

  2. 2.

    www.github.com/alaodamilola/CupCarbon-Simulation-Tool-with-NtruEncrypt.

References

  1. Biryukov, A., Perrin, L.: State of the art in lightweight symmetric cryptography. IACR Cryptol. ePrint Arch. 2017, 511 (2017)

    Google Scholar 

  2. Bogdanov, A., et al.: PRESENT: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450–466. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-74735-2_31

    Chapter  Google Scholar 

  3. Chernyshev, M., Baig, Z., Bello, O., Zeadally, S.: Internet of Things (IoT): research, simulators, and testbeds. IEEE Internet Things J. 5(3), 1637–1647 (2018)

    Google Scholar 

  4. Dinu, D., Biryukov, A., Groszschädl, J., Khovratovich, D., Corre, Y.L., Perrin, L.: FELICS - fair evaluation of lightweight cryptographic systems. In: NIST Workshop on Lightweight Cryptography (2015)

    Google Scholar 

  5. Dobraunig, C., Eichlseder, M., Mendel, F., Schläffer, M.: Ascon v1.2: lightweight Authenticated Encryption and Hashing. J. Cryptol. 34(3), 1–42 (2021). https://doi.org/10.1007/s00145-021-09398-9

    Article  MathSciNet  MATH  Google Scholar 

  6. Goyal, T.K., Sahula, V.: Lightweight security algorithm for low power IoT devices. In: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1725–1729 (2016)

    Google Scholar 

  7. Gupta, H., Vahid Dastjerdi, A., Ghosh, S.K., Buyya, R.: iFogSim: A toolkit for modeling and simulation of resource management techniques in the Internet of Things, Edge and Fog computing environments. Softw.: Pract. Exp. 47(9), 1275–1296 (2017)

    Google Scholar 

  8. Han, S.N., et al.: DPWSim: a simulation toolkit for IoT applications using devices profile for web services. In: 2014 IEEE World Forum on Internet of Things (WF-IoT), pp. 544–547 (2014)

    Google Scholar 

  9. Homma, N., et al.: Cryptographic technology guideline (lightweight cryptography). Cryptographic Technology Guideline, pp. 1–112 (2017)

    Google Scholar 

  10. Kecskemeti, G., Casale, G., Jha, D.N., Lyon, J., Ranjan, R.: Modelling and simulation challenges in Internet of Things. IEEE Cloud Comput. 4(1), 62–69 (2017)

    Article  Google Scholar 

  11. Lei, X., Liao, X.: Ntru-ke: A lattice-based public key exchange protocol. IACR Cryptol. ePrint Arch. 2013, 718 (2013)

    Google Scholar 

  12. Mehdi, K., Lounis, M., Bounceur, A., Kechadi, T.: CupCarbon: a multi-agent and discrete event wireless sensor network design and simulation tool. In: Proceedings of the 7th International ICST Conference on Simulation Tools and Techniques (2014)

    Google Scholar 

  13. Osterlind, F., Dunkels, A., Eriksson, J., Finne, N., Voigt, T.: Cross-level sensor network simulation with cooja. In: Proceedings. 2006 31st IEEE Conference on Local Computer Networks, pp. 641–648 (2006)

    Google Scholar 

  14. Philip, M., Vaithiyanathan: A survey on lightweight ciphers for IoT devices. In: 2017 International Conference on Technological Advancements in Power and Energy (TAP Energy), pp. 1–4 (12 2017)

    Google Scholar 

  15. Sen, A., Fletcher, K., Madria, S.: A secure user-centric framework for dynamic service provisioning in IoT environments. In: 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), pp. 334–341 (2019)

    Google Scholar 

  16. Zeng, X., Garg, S.K., Strazdins, P., Jayaraman, P.P., Georgakopoulos, D., Ranjan, R.: IOTSim: a simulator for analysing IoT applications. J. Syst. Architect. 72, 93–107 (2017)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Damilola Alao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Alao, D., Hamrick, E., Bhat, S., Sen, A., Fletcher, K. (2023). An IoT Simulator Tool for Provisioning Secure and Dynamic User-centric Services. In: Tekinerdogan, B., Wang, Y., Zhang, LJ. (eds) Internet of Things – ICIOT 2022. ICIOT 2022. Lecture Notes in Computer Science, vol 13735. Springer, Cham. https://doi.org/10.1007/978-3-031-23582-5_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-23582-5_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-23581-8

  • Online ISBN: 978-3-031-23582-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics