Skip to main content

Elliptic Curve Based Cybersecurity Schemes for Publish-Subscribe Internet of Things

  • Conference paper
  • First Online:
Quality, Reliability, Security and Robustness in Heterogeneous Networks (QShine 2016)

Abstract

The rapid increase in the number of connected things across the globe has been brought about by the deployment of the Internet of things (IoTs) at home, in organizations and industries. The innovation of smart things has been envisioned through various protocols, but the most prevalent protocols are publish-subscribe protocols such as Message Queue Telemetry Transport (MQTT) and Advanced Message Queuing Protocol (AMQP). One of the major concerns in the adoption of such protocols for the IoTs is the lack of security mechanisms as the existing security protocols cannot be adapted due to their large overhead of computations, storage and communications. To address this issue, we propose a lightweight protocol using Elliptic Curve Cryptography (ECC) for IoT security. We present analytical and simulation results, and compare the results to the existing protocols of traditional Internet.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Securing the Internet of Things: A Proposed Framework (2016). http://www.cisco.com/c/en/us/about/security-center/secure-iot-proposed-framework.html

  2. Shen, H., Kumar, N., He, D., Shen, J., Chilamkurti, N.: A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem. J. Supercomput. 72, 3588–3600 (2016)

    Article  Google Scholar 

  3. Zhang, Z., Qi, Q., Kumar, N., Chilamkurti, N., Jeong, H.-Y.: A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography. Multimed. Tools Appl. 74(10), 3477–3488 (2014)

    Article  Google Scholar 

  4. Hankerson, D., Vanstone, S., Menezes, A.J.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2004)

    MATH  Google Scholar 

  5. Sandeep, S.: Elliptic curve cryptography for constrained devices. Ph.D. Dissertation (2006)

    Google Scholar 

  6. Singh, M., Rajan, M.A., Shivraj, V.L., Balamuralidhar, P.: Secure MQTT for Internet of Things (IoT). In: 2015 Fifth International Conference on Communication Systems and Network Technologies (CSNT), pp. 746–751, 4–6 April 2015

    Google Scholar 

  7. Mitchell, J.C., Shmatikov, V., Stern, U.: Finite-state analysis of SSL 3.0. In: Proceedings of the 7th Conference on USENIX Security Symposium (SSYM 1998), Berkeley, CA, USA, vol. 7, p. 16. USENIX Association (1998)

    Google Scholar 

  8. Fiege, L., Zeidler, A., Buchmann, A., Kilian-Kehr, R., Mühl, G., Darmstadt, T.: Security aspects in publish/subscribe systems. In: Third International Workshop on Distributed Event-based Systems (DEBS 2004) (2004)

    Google Scholar 

  9. Gupta, V., Wurm, M., Zhu, Y., Millard, M., Fung, S., Gura, N., Eberle, H., Shantz, S.C.: Sizzle: a standards-based end-to-end security architecture for the embedded internet. Technical report, Sun Microsystems, Inc., Mountain View, CA, USA (2005)

    Google Scholar 

  10. Porambage, P., Braeken, A., Schmitt, C., Gurtov, A., Ylianttila, M., Stiller, B.: Group key establishment for enabling secure multicast communication in wireless sensor networks deployed for IoT applications. Access IEEE 3, 1503–1511 (2015)

    Article  Google Scholar 

  11. Srivatsa, M., Liu, L.: Secure event dissemination in publish-subscribe networks. In: Conference on Distributed Computing Systems (2007)

    Google Scholar 

  12. Opyrchal, L., Prakash,A., Agrawal, A.: Designing a publish-subscribe substrate for privacy/security in pervasive environments. In: Proceedings of the 2006 ACS/IEEE International Conference on Pervasive Services, pp. 313–316, 26–29 June 2006

    Google Scholar 

  13. Wang, C., Carzaniga, A., Evans, D., Wolf, A.L.: Security issues and requirements for Internet-scale publish-subscribe systems. In: Proceedings of the 35th Annual Hawaii International Conference on System Sciences, HICSS 2002, pp. 3940–3947 (2002)

    Google Scholar 

  14. Srivatsa, M., Liu, L., Iyengar, A.: Eventguard: a system architecture for securing publish-subscribe networks. ACM Trans. Comput. Syst. 29, 4 (2011)

    Article  Google Scholar 

Download references

Acknowledgment

Our thanks to Pervasive Computing and Networking Lab, La Trobe University, Melbourne, Australia for material and financial support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abebe Abeshu Diro .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Diro, A.A., Chilamkurti, N., Veeraraghavan, P. (2017). Elliptic Curve Based Cybersecurity Schemes for Publish-Subscribe Internet of Things. In: Lee, JH., Pack, S. (eds) Quality, Reliability, Security and Robustness in Heterogeneous Networks. QShine 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 199. Springer, Cham. https://doi.org/10.1007/978-3-319-60717-7_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-60717-7_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-60716-0

  • Online ISBN: 978-3-319-60717-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics