skip to main content
10.1145/3231053.3231079acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicfndsConference Proceedingsconference-collections
research-article

A distributed security protocol designed for the context of internet of things

Published:26 June 2018Publication History

ABSTRACT

In the field of Internet of Things (IoT), many encryption protocols for distributed wireless communication technology have been proposed for use in various applications such as monitoring, healthcare, product management, workplace, home support and surveillance [1]. An IoT system can be looked at as a highly dynamic distributed and networked system composed of a large number of smart devices. In fact, such connected devices suffer from the limitation of resources in terms of computing, energy, bandwidth and storage. Hence, IoT application scenarios require methods to adapt to highly diverse contexts with different available resources and possibly dynamic environments. In this paper, we address these issues by proposing an efficient technique for data protection in the context of IoT. A distributed network architecture is used, where each node is in charge to deliver and/or forward data. The aim is to use efficient operations to protect the exchanged data. The proposed technique ensures the exchanged data to be effectively and securely controlled with a low overhead compared to the classical approaches. The proposed protocol shows its efficiency in terms of overhead, speed, energy and security measurements.

References

  1. I. Ghafir, V. Prenosil, J. Svoboda, and M. Hammoudeh, "A survey on network security monitoring systems," in Future Internet of Things and Cloud Workshops (FiCloudW), IEEE International Conference on. IEEE, 2016, pp. 77--82.Google ScholarGoogle Scholar
  2. F. Y. Shih, Digital watermarking and steganography: fundamentals and techniques. CRC Press, 2017.Google ScholarGoogle Scholar
  3. F. Lalem, M. Alshaikh, A. Bounceur, R. Euler, L. Laouamer, L. Nana, and A. Pascu, "Data authenticity and integrity in wireless sensor networks based on a water-marking approach." in FLAIRS Conference, 2016, pp. 282--287.Google ScholarGoogle Scholar
  4. S. Moffat, M. Hammoudeh, and R. Hegarty, "A survey on ciphertext-policy attribute-based encryption (cp-abe) approaches to data security on mobile devices and its application to iot" in Proceedings of the International Conference on Future Networks and Distributed Systems. ACM, 2017, p. 34. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Y. Atwady and M. Hammoudeh, "A survey on authentication techniques for the internet of things" in Proceedings of the International Conference on Future Networks and Distributed Systems. ACM, 2017, p. 8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. A. Jan, P. Nanda, X. He, Z. Tan, and R. P. Liu, "A robust authentication scheme for observing resources in the internet of things environment" in Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on. IEEE, 2014, pp. 205--211. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. D. Chen, G. Chang, D. Sun, J. Jia, and X. Wang, "Lightweight key management scheme to enhance the security of internet of things," International Journal of Wireless and Mobile Computing, vol. 5, no. 2, pp. 191--198, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. P. N. Mahalle, N. R. Prasad, and R. Prasad, "Threshold cryptography-based group authentication (tcga) scheme for the internet of things (iot)," in Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE), 2014 4th International Conference on. IEEE, 2014, pp. 1--5.Google ScholarGoogle Scholar
  9. Y. Fu, Z. Yan, J. Cao, O. Koné, and X. Cao, "An automata based intrusion detection method for internet of things" Mobile Information Systems, vol. 2017, 2017.Google ScholarGoogle Scholar
  10. H. Krawczyk, "Hmqv: A high-performance secure diffie-hellman protocol," in Annual International Cryptology Conference. Springer, 2005, pp. 546--566. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. Laouid, A. Dahmani, H. R. Hassen, A. Bounceur, R. Euler, F. Lalem, and A. Tari, "A self-managing volatile key scheme for wireless sensor networks," Journal of Ambient Intelligence and Humanized Computing, pp. 1--16, 2018.Google ScholarGoogle Scholar
  12. A. Laouid, M.-L. Messai, A. Bounceur, R. Euler, A. Dahmani, and A. Tari, "A dynamic and distributed key management scheme for wireless sensor networks," in Proceedings of the International Conference on Internet of things and Cloud Computing. ACM, 2016, p. 70. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. C.-Y. Chen and H.-C. Chao, "A survey of key distribution in wireless sensor networks," Security and Communication Networks, vol. 7, no. 12, pp. 2495--2508, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  14. S.-H. Seo, J. Won, S. Sultana, and E. Bertino, "Effective key management in dynamic wireless sensor networks," IEEE Transactions on Information Forensics and Security, vol. 10, no. 2, pp. 371--383, 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. R. Alvarez, C. Caballero-Gil, J. Santonja, and A. Zamora, "Algorithms for lightweight key exchange," Sensors, vol. 17, no. 7, p. 1517, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  16. M. AlShaikh, L. Laouamer, L. Nana, and A. Pascu, "A novel ct scan images watermarking scheme in dwt transform coefficients," International Journal of Computer Science and Network Security (IJCSNS), vol. 16, no. 1, p. 62, 2016.Google ScholarGoogle Scholar
  17. L. Laouamer, M. Alshaikh, L. Nana, and A. C. Pascu, "Generating optimal informed and adaptive watermark image based on zero-suppressed binary decision diagrams for medical images," International Journal of Electronic Security and Digital Forensics, vol. 8, no. 3, pp. 262--284, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. M. AlShaikh, L. Laouamer, L. Nana, and A. C. Pascu, "Efficient and robust encryption and watermarking technique based on a new chaotic map approach," Multimedia Tools and Applications, vol. 76, no. 6, pp. 8937--8950, 2017. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A distributed security protocol designed for the context of internet of things

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICFNDS '18: Proceedings of the 2nd International Conference on Future Networks and Distributed Systems
      June 2018
      469 pages
      ISBN:9781450364287
      DOI:10.1145/3231053

      Copyright © 2018 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 26 June 2018

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader