Abstract
User-centric service provisioning for IoT applications currently faces a challenge, where existing frameworks consider security provisioning as a one-size-fits-all paradigm. The user’s preferences on parameters like QoS and security are dynamic and change over time, while the strength of service security also inversely affects QoS. This paper builds upon our previously proposed framework, for secure and dynamic user-centric service provisioning for IoT applications, by implementing it on an IoT application simulation tool, CupCarbon. To achieve this, an extensive survey on lightweight security protocols like Trivium, Ascon, and NtruEncrypt specifically designed for IoT systems, with performance evaluation based on metrics like key generation time, encryption and decryption time, and latency values was carried out. The most efficient protocol (NtruEncrypt), was integrated into the CupCarbon simulator as an IoT application use-case scenario, and its performance compared with CupCarbon’s default security protocol - Blowfish. Analysis show NtruEncrypt has better simulation latency compared to Blowfish. Using the modified version of the CupCarbon simulator tool, researchers can model real-life user-centric IoT service provisioning scenarios where security can be provisioned as a dynamic parameter.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Biryukov, A., Perrin, L.: State of the art in lightweight symmetric cryptography. IACR Cryptol. ePrint Arch. 2017, 511 (2017)
Bogdanov, A., et al.: PRESENT: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450–466. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-74735-2_31
Chernyshev, M., Baig, Z., Bello, O., Zeadally, S.: Internet of Things (IoT): research, simulators, and testbeds. IEEE Internet Things J. 5(3), 1637–1647 (2018)
Dinu, D., Biryukov, A., Groszschädl, J., Khovratovich, D., Corre, Y.L., Perrin, L.: FELICS - fair evaluation of lightweight cryptographic systems. In: NIST Workshop on Lightweight Cryptography (2015)
Dobraunig, C., Eichlseder, M., Mendel, F., Schläffer, M.: Ascon v1.2: lightweight Authenticated Encryption and Hashing. J. Cryptol. 34(3), 1–42 (2021). https://doi.org/10.1007/s00145-021-09398-9
Goyal, T.K., Sahula, V.: Lightweight security algorithm for low power IoT devices. In: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1725–1729 (2016)
Gupta, H., Vahid Dastjerdi, A., Ghosh, S.K., Buyya, R.: iFogSim: A toolkit for modeling and simulation of resource management techniques in the Internet of Things, Edge and Fog computing environments. Softw.: Pract. Exp. 47(9), 1275–1296 (2017)
Han, S.N., et al.: DPWSim: a simulation toolkit for IoT applications using devices profile for web services. In: 2014 IEEE World Forum on Internet of Things (WF-IoT), pp. 544–547 (2014)
Homma, N., et al.: Cryptographic technology guideline (lightweight cryptography). Cryptographic Technology Guideline, pp. 1–112 (2017)
Kecskemeti, G., Casale, G., Jha, D.N., Lyon, J., Ranjan, R.: Modelling and simulation challenges in Internet of Things. IEEE Cloud Comput. 4(1), 62–69 (2017)
Lei, X., Liao, X.: Ntru-ke: A lattice-based public key exchange protocol. IACR Cryptol. ePrint Arch. 2013, 718 (2013)
Mehdi, K., Lounis, M., Bounceur, A., Kechadi, T.: CupCarbon: a multi-agent and discrete event wireless sensor network design and simulation tool. In: Proceedings of the 7th International ICST Conference on Simulation Tools and Techniques (2014)
Osterlind, F., Dunkels, A., Eriksson, J., Finne, N., Voigt, T.: Cross-level sensor network simulation with cooja. In: Proceedings. 2006 31st IEEE Conference on Local Computer Networks, pp. 641–648 (2006)
Philip, M., Vaithiyanathan: A survey on lightweight ciphers for IoT devices. In: 2017 International Conference on Technological Advancements in Power and Energy (TAP Energy), pp. 1–4 (12 2017)
Sen, A., Fletcher, K., Madria, S.: A secure user-centric framework for dynamic service provisioning in IoT environments. In: 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), pp. 334–341 (2019)
Zeng, X., Garg, S.K., Strazdins, P., Jayaraman, P.P., Georgakopoulos, D., Ranjan, R.: IOTSim: a simulator for analysing IoT applications. J. Syst. Architect. 72, 93–107 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Alao, D., Hamrick, E., Bhat, S., Sen, A., Fletcher, K. (2023). An IoT Simulator Tool for Provisioning Secure and Dynamic User-centric Services. In: Tekinerdogan, B., Wang, Y., Zhang, LJ. (eds) Internet of Things – ICIOT 2022. ICIOT 2022. Lecture Notes in Computer Science, vol 13735. Springer, Cham. https://doi.org/10.1007/978-3-031-23582-5_6
Download citation
DOI: https://doi.org/10.1007/978-3-031-23582-5_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-23581-8
Online ISBN: 978-3-031-23582-5
eBook Packages: Computer ScienceComputer Science (R0)