Abstract
The rapid increase in the number of connected things across the globe has been brought about by the deployment of the Internet of things (IoTs) at home, in organizations and industries. The innovation of smart things has been envisioned through various protocols, but the most prevalent protocols are publish-subscribe protocols such as Message Queue Telemetry Transport (MQTT) and Advanced Message Queuing Protocol (AMQP). One of the major concerns in the adoption of such protocols for the IoTs is the lack of security mechanisms as the existing security protocols cannot be adapted due to their large overhead of computations, storage and communications. To address this issue, we propose a lightweight protocol using Elliptic Curve Cryptography (ECC) for IoT security. We present analytical and simulation results, and compare the results to the existing protocols of traditional Internet.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Securing the Internet of Things: A Proposed Framework (2016). http://www.cisco.com/c/en/us/about/security-center/secure-iot-proposed-framework.html
Shen, H., Kumar, N., He, D., Shen, J., Chilamkurti, N.: A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem. J. Supercomput. 72, 3588–3600 (2016)
Zhang, Z., Qi, Q., Kumar, N., Chilamkurti, N., Jeong, H.-Y.: A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography. Multimed. Tools Appl. 74(10), 3477–3488 (2014)
Hankerson, D., Vanstone, S., Menezes, A.J.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2004)
Sandeep, S.: Elliptic curve cryptography for constrained devices. Ph.D. Dissertation (2006)
Singh, M., Rajan, M.A., Shivraj, V.L., Balamuralidhar, P.: Secure MQTT for Internet of Things (IoT). In: 2015 Fifth International Conference on Communication Systems and Network Technologies (CSNT), pp. 746–751, 4–6 April 2015
Mitchell, J.C., Shmatikov, V., Stern, U.: Finite-state analysis of SSL 3.0. In: Proceedings of the 7th Conference on USENIX Security Symposium (SSYM 1998), Berkeley, CA, USA, vol. 7, p. 16. USENIX Association (1998)
Fiege, L., Zeidler, A., Buchmann, A., Kilian-Kehr, R., Mühl, G., Darmstadt, T.: Security aspects in publish/subscribe systems. In: Third International Workshop on Distributed Event-based Systems (DEBS 2004) (2004)
Gupta, V., Wurm, M., Zhu, Y., Millard, M., Fung, S., Gura, N., Eberle, H., Shantz, S.C.: Sizzle: a standards-based end-to-end security architecture for the embedded internet. Technical report, Sun Microsystems, Inc., Mountain View, CA, USA (2005)
Porambage, P., Braeken, A., Schmitt, C., Gurtov, A., Ylianttila, M., Stiller, B.: Group key establishment for enabling secure multicast communication in wireless sensor networks deployed for IoT applications. Access IEEE 3, 1503–1511 (2015)
Srivatsa, M., Liu, L.: Secure event dissemination in publish-subscribe networks. In: Conference on Distributed Computing Systems (2007)
Opyrchal, L., Prakash,A., Agrawal, A.: Designing a publish-subscribe substrate for privacy/security in pervasive environments. In: Proceedings of the 2006 ACS/IEEE International Conference on Pervasive Services, pp. 313–316, 26–29 June 2006
Wang, C., Carzaniga, A., Evans, D., Wolf, A.L.: Security issues and requirements for Internet-scale publish-subscribe systems. In: Proceedings of the 35th Annual Hawaii International Conference on System Sciences, HICSS 2002, pp. 3940–3947 (2002)
Srivatsa, M., Liu, L., Iyengar, A.: Eventguard: a system architecture for securing publish-subscribe networks. ACM Trans. Comput. Syst. 29, 4 (2011)
Acknowledgment
Our thanks to Pervasive Computing and Networking Lab, La Trobe University, Melbourne, Australia for material and financial support.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Diro, A.A., Chilamkurti, N., Veeraraghavan, P. (2017). Elliptic Curve Based Cybersecurity Schemes for Publish-Subscribe Internet of Things. In: Lee, JH., Pack, S. (eds) Quality, Reliability, Security and Robustness in Heterogeneous Networks. QShine 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 199. Springer, Cham. https://doi.org/10.1007/978-3-319-60717-7_26
Download citation
DOI: https://doi.org/10.1007/978-3-319-60717-7_26
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-60716-0
Online ISBN: 978-3-319-60717-7
eBook Packages: Computer ScienceComputer Science (R0)