ABSTRACT
In the field of Internet of Things (IoT), many encryption protocols for distributed wireless communication technology have been proposed for use in various applications such as monitoring, healthcare, product management, workplace, home support and surveillance [1]. An IoT system can be looked at as a highly dynamic distributed and networked system composed of a large number of smart devices. In fact, such connected devices suffer from the limitation of resources in terms of computing, energy, bandwidth and storage. Hence, IoT application scenarios require methods to adapt to highly diverse contexts with different available resources and possibly dynamic environments. In this paper, we address these issues by proposing an efficient technique for data protection in the context of IoT. A distributed network architecture is used, where each node is in charge to deliver and/or forward data. The aim is to use efficient operations to protect the exchanged data. The proposed technique ensures the exchanged data to be effectively and securely controlled with a low overhead compared to the classical approaches. The proposed protocol shows its efficiency in terms of overhead, speed, energy and security measurements.
- I. Ghafir, V. Prenosil, J. Svoboda, and M. Hammoudeh, "A survey on network security monitoring systems," in Future Internet of Things and Cloud Workshops (FiCloudW), IEEE International Conference on. IEEE, 2016, pp. 77--82.Google Scholar
- F. Y. Shih, Digital watermarking and steganography: fundamentals and techniques. CRC Press, 2017.Google Scholar
- F. Lalem, M. Alshaikh, A. Bounceur, R. Euler, L. Laouamer, L. Nana, and A. Pascu, "Data authenticity and integrity in wireless sensor networks based on a water-marking approach." in FLAIRS Conference, 2016, pp. 282--287.Google Scholar
- S. Moffat, M. Hammoudeh, and R. Hegarty, "A survey on ciphertext-policy attribute-based encryption (cp-abe) approaches to data security on mobile devices and its application to iot" in Proceedings of the International Conference on Future Networks and Distributed Systems. ACM, 2017, p. 34. Google ScholarDigital Library
- Y. Atwady and M. Hammoudeh, "A survey on authentication techniques for the internet of things" in Proceedings of the International Conference on Future Networks and Distributed Systems. ACM, 2017, p. 8. Google ScholarDigital Library
- M. A. Jan, P. Nanda, X. He, Z. Tan, and R. P. Liu, "A robust authentication scheme for observing resources in the internet of things environment" in Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on. IEEE, 2014, pp. 205--211. Google ScholarDigital Library
- D. Chen, G. Chang, D. Sun, J. Jia, and X. Wang, "Lightweight key management scheme to enhance the security of internet of things," International Journal of Wireless and Mobile Computing, vol. 5, no. 2, pp. 191--198, 2012. Google ScholarDigital Library
- P. N. Mahalle, N. R. Prasad, and R. Prasad, "Threshold cryptography-based group authentication (tcga) scheme for the internet of things (iot)," in Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE), 2014 4th International Conference on. IEEE, 2014, pp. 1--5.Google Scholar
- Y. Fu, Z. Yan, J. Cao, O. Koné, and X. Cao, "An automata based intrusion detection method for internet of things" Mobile Information Systems, vol. 2017, 2017.Google Scholar
- H. Krawczyk, "Hmqv: A high-performance secure diffie-hellman protocol," in Annual International Cryptology Conference. Springer, 2005, pp. 546--566. Google ScholarDigital Library
- A. Laouid, A. Dahmani, H. R. Hassen, A. Bounceur, R. Euler, F. Lalem, and A. Tari, "A self-managing volatile key scheme for wireless sensor networks," Journal of Ambient Intelligence and Humanized Computing, pp. 1--16, 2018.Google Scholar
- A. Laouid, M.-L. Messai, A. Bounceur, R. Euler, A. Dahmani, and A. Tari, "A dynamic and distributed key management scheme for wireless sensor networks," in Proceedings of the International Conference on Internet of things and Cloud Computing. ACM, 2016, p. 70. Google ScholarDigital Library
- C.-Y. Chen and H.-C. Chao, "A survey of key distribution in wireless sensor networks," Security and Communication Networks, vol. 7, no. 12, pp. 2495--2508, 2014.Google ScholarCross Ref
- S.-H. Seo, J. Won, S. Sultana, and E. Bertino, "Effective key management in dynamic wireless sensor networks," IEEE Transactions on Information Forensics and Security, vol. 10, no. 2, pp. 371--383, 2015.Google ScholarDigital Library
- R. Alvarez, C. Caballero-Gil, J. Santonja, and A. Zamora, "Algorithms for lightweight key exchange," Sensors, vol. 17, no. 7, p. 1517, 2017.Google ScholarCross Ref
- M. AlShaikh, L. Laouamer, L. Nana, and A. Pascu, "A novel ct scan images watermarking scheme in dwt transform coefficients," International Journal of Computer Science and Network Security (IJCSNS), vol. 16, no. 1, p. 62, 2016.Google Scholar
- L. Laouamer, M. Alshaikh, L. Nana, and A. C. Pascu, "Generating optimal informed and adaptive watermark image based on zero-suppressed binary decision diagrams for medical images," International Journal of Electronic Security and Digital Forensics, vol. 8, no. 3, pp. 262--284, 2016. Google ScholarDigital Library
- M. AlShaikh, L. Laouamer, L. Nana, and A. C. Pascu, "Efficient and robust encryption and watermarking technique based on a new chaotic map approach," Multimedia Tools and Applications, vol. 76, no. 6, pp. 8937--8950, 2017. Google ScholarDigital Library
Index Terms
- A distributed security protocol designed for the context of internet of things
Recommendations
Internet of Things security
The Internet of things (IoT) has recently become an important research topic because it integrates various sensors and objects to communicate directly with one another without human intervention. The requirements for the large-scale deployment of the ...
Cyberentity Security in the Internet of Things
A proposed Internet of Things system architecture offers a solution to the broad array of challenges researchers face in terms of general system security, network security, and application security.
Context-aware security in the internet of things: a survey
Internet of things (IoT) applications encompass home-automation, health, transportation, etc. The main objective of these applications is to improve user's lives. However, security and privacy threats and the lack of adapted security mechanisms could ...
Comments