Advertisement

Reliable and secure data transfer in IoT networks

  • Sarada Prasad Gochhayat
  • Chhagan Lal
  • Lokesh Sharma
  • D. P. Sharma
  • Deepak Gupta
  • Jose Antonio Marmolejo Saucedo
  • Utku KoseEmail author
Article
  • 14 Downloads

Abstract

With the rapid technological improvements in mobile devices and their inclusion in Internet of Things (IoT), secure key management becomes mandatory to ensure security of information exchange. For instance, IoT applications, such as smart health-care and smart homes, provide automated services to the users with less or no user intervention. As these application use user-sensitive data, ensuring their security and privacy should be paramount, especially during the key management process. However, traditional approaches for key management will not suit well in IoT environment because of the inherent resource constraint property of IoT devices. In this paper, we propose a novel distributed key management scheme for IoT ecosystem. The proposed scheme efficiently provides security to IoT devices by delegating most of the resource consuming cryptographic processing to a local entity. This entity coordinates with other peer entities to provide a distributed key as well as an authentication mechanism to network devices. In particular, the proposed scheme exploits the advantages of mobile agents by deploying them in different subnetworks as and when required: (1) to process the cryptography work for the IoT devices, and (2) to act as an local authenticated entity to perform fast authentication process. To verify the effectiveness and correctness of our proposed scheme, we have simulated it in a large IoT scenario and evaluated against relevant metrics that includes user mobility, certification generation time, and communication overhead.

Keywords

Security Internet of Things Mobile agents Resource exhaustion Wireless networks 

Notes

References

  1. 1.
    Baker, S. B., Xiang, W., & Atkinson, I. (2017). Internet of things for smart healthcare: Technologies, challenges, and opportunities. IEEE Access, 5, 26521–26544.CrossRefGoogle Scholar
  2. 2.
    Abu Mansour, H. Y., & Elayyan, H. (2018). IoT theme for smart datamining-based environment to unify distributed learning management systems. In 2018 9th International Conference on Information and Communication Systems (ICICS) (pp. 212–217).Google Scholar
  3. 3.
    Aman, M. S., Quint, C. D., Abdelgawad, A., & Yelamarthi, K. (2017). Sensing and classifying indoor environments: An iot based portable tour guide system. In 2017 IEEE Sensors Applications Symposium (SAS) (pp. 1–6).Google Scholar
  4. 4.
    Li, R., Asaeda, H., & Li, J. (2017). A distributed publisher-driven secure data sharing scheme for information-centric IoT. IEEE Internet of Things Journal, 4(3), 791–803.CrossRefGoogle Scholar
  5. 5.
    Wazid, M., Das, A. K., Odelu, V., Kumar, N., Conti, M., & Jo, M. (2018). Design of secure user authenticated key management protocol for generic iot networks. IEEE Internet of Things Journal, 5(1), 269–282.CrossRefGoogle Scholar
  6. 6.
    Maheshwari, N., & Dagale, H. (2018). Secure communication and firewall architecture for IoT applications. In 2018 10th International Conference on Communication Systems Networks (COMSNETS) (pp. 328–335).Google Scholar
  7. 7.
    Torre, I., Koceva, F., Sanchez, O. R., Adorni, G. (2016). A framework for personal data protection in the IoT. In 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) (pp. 384–391).Google Scholar
  8. 8.
    Gochhayat, S. P., Kaliyar, P., Conti, M., Tiwari, P., Prasath, V. B. S., Gupta, D., et al. (2019). LISA: Lightweight context-aware IoT service architecture. Journal of Cleaner Production, 212, 1345–1356.CrossRefGoogle Scholar
  9. 9.
    Li, Q. Q., Prasad Gochhayat, S., Conti, M., & Liu, F. A. (2017). EnergIoT: A solution to improve network lifetime of IoT devices. Pervasive and Mobile Computing, 42, 124–133.CrossRefGoogle Scholar
  10. 10.
    Oh, S., & Kim, Y. (2017). Security requirements analysis for the IoT. In 2017 International Conference on Platform Technology and Service (PlatCon) (pp. 1–6).Google Scholar
  11. 11.
    Conti, M., Kaliyar, P., & Lal, C. (2017). Remi: A reliable and secure multicast routing protocol for IoT networks. In Proceedings of the 12th International Conference on Availability, Reliability and Security, ARES ’17 (pp. 84:1–84:8).Google Scholar
  12. 12.
    Myles, G., Friday, A., & Davies, N. (2003). Preserving privacy in environments with location-based applications. IEEE Pervasive Computing, 2(1), 56–64.CrossRefGoogle Scholar
  13. 13.
    Zhang, K., Yang, K., Liang, X., Su, Z., Shen, X., & Luo, H. H. (2015). Security and privacy for mobile healthcare networks: From a quality of protection perspective. IEEE Wireless Communications, 22(4), 104–112.CrossRefGoogle Scholar
  14. 14.
    Chen, D., Bovornkeeratiroj, P., Irwin, D., & Shenoy, P. (2018). Private memoirs of iot devices: Safeguarding user privacy in the IoT era. In 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS) (pp. 1327–1336).Google Scholar
  15. 15.
    Liu, X., Leon-Garcia, A., & Zhu, P. (2017). A distributed software-defined multi-agent architecture for unifying IoT applications. In 8th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON) (pp. 49–55). BC: Vancouver.Google Scholar
  16. 16.
    Hasan et al., H. (2017). Secure lightweight ECC-based protocol for multi-agent IoT systems. In IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Rome (pp. 1–8).Google Scholar
  17. 17.
    Conti, M., Kaliyar, P., Rabbani, M.M., & Ranise, S. (2018). SPLIT: A secure and scalable RPL routing protocol for Internet of Things. In 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Limassol (pp. 1–8).Google Scholar
  18. 18.
    Castiglione, A., Santis, A. D., Castiglione, A., Palmieri, F., & Fiore, U. (2013). An energy-aware framework for reliable and secure end-to-end ubiquitous data communications. In Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, INCOS ’13 (pp. 157–165). IEEE Computer Society, Washington, DC, USA.Google Scholar
  19. 19.
    Allcock, B., Bester, J., Bresnahan, J., Chervenak, A., Kesselman, C., Meder, S., Nefedova, V., Quesnel, D., Tuecke, S., Foster, I. (2001). Secure, efficient data transport and replica management for high-performance data-intensive computing. In Eighteenth IEEE Symposium on Mass Storage Systems and Technologies, 2001. MSS ’01 (pp. 13–13).Google Scholar
  20. 20.
    Roth, J. (2002). Context-aware web applications using the pinpoint infrastructure. In IADIS International Conference WWW/Internet 2002 (pp. 13–15). IADIS Press.Google Scholar
  21. 21.
    Jones, V., & Jo, J. H. (2004). Ubiquitous learning environment: An adaptive teaching system using ubiquitous technology. In Beyond the comfort zone: Proceedings of the 21st ASCILITE Conference (vol. 468, p. 474).Google Scholar
  22. 22.
    Chiu, D. K., & Leung, H. F. (2005). Towards ubiquitous tourist service coordination and integration: A multi-agent and semantic web approach. In Proceedings of the 7th International Conference on Electronic Commerce (pp. 574–581). ACM.Google Scholar
  23. 23.
    Ardissono, L., Goy, A., Petrone, G., Segnan, M., & Torasso, P. (2002). Ubiquitous user assistance in a tourist information server. In Adaptive hypermedia and adaptive web-based systems (pp. 14–23). Springer.Google Scholar
  24. 24.
    Carlier, F., & Renault, V. (2016). Iot-a, embedded agents for smart internet of things: Application on a display wall. In 2016 IEEE/WIC/ACM International Conference on Web Intelligence Workshops (WIW) (pp. 80–83).Google Scholar
  25. 25.
    Cicirello, V., Peysakhov, M., Anderson, G., Naik, G., Tsang, K., Regli, W., et al. (2004). Designing dependable agent systems for mobile wireless networks. IEEE Intelligent Systems, 19(5), 39–45.CrossRefGoogle Scholar
  26. 26.
    Anderson, G., Burnheimer, A., Cicirello, V., Dorsey, D., Garcia, S., Kam, M., Kopena, J., Malfettone, K., Mroczkowski, A., Naik, G., Peysakhov, M., Regli, W., Shaffer, J., Sultanik, E., Tsang, K., Urbano, L., Usbeck, K., & Warren, J. (2004). Demonstration of the secure wireless agent testbed (swat). In Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004 (pp. 1214–1215).Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Virginia Modeling Analysis and Simulation CenterOld Dominion UniversityNorfolkUSA
  2. 2.Department of MathematicsUniversity of PadovaPadovaItaly
  3. 3.Department of ITManipal University JaipurJaipurIndia
  4. 4.Maharaja Agrasen Institute of TechnologyNew DelhiIndia
  5. 5.Universidad PanamericanaMexicoMexico
  6. 6.Suleyman Demirel UniversityIspartaTurkey

Personalised recommendations