Advertisement

On the Relevance of Using Multi-layered Security in the Opportunistic Internet-of-Things

  • Antoine BagulaEmail author
  • Lutando Ngaqwazai
  • Claude Lubamba Kakoko
  • Olasupo Ajayi
Conference paper
  • 57 Downloads
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 311)

Abstract

Wireless Sensor Networks (WSNs) have recently gained more importance as key building blocks for the Internet of Things (IoT); a network infrastructure which has greatly increased in number of connected objects with instantaneous communication, data processing and pervasive access to the objects that we manipulate daily. However, WSNs may sometimes need to be deployed in an opportunistic fashion when there is no network with stable power supply available to support the dissemination of the sensor readings from their collection points to a gateway. For such deployments, traditional networking paradigms may fall short to secure the WSNs since most of the well-known security algorithms have been designed for the traditional high quality of service and fully connected networks. Building around some of the security algorithms and protocols which have been developed in the context of Delay Tolerant Networking, this paper presents a multi-layered security model for the opportunistic IoT. The model combines a hash based message authentication code (HMAC) algorithm implemented at the application layer of the IEEE 802.15.4 stack and an Access Control List (ACL) based identity based encryption algorithm used by the IEEE 802.15.4 MAC layer as a new and novel method of signing and authenticating data which is stored and forwarded on an opportunistic Internet of Things (IoT) infrastructure.

Keywords

Multi-layered security Internet-of-Things Wireless sensor networks Opportunistic networking 

References

  1. 1.
    Pelusi, L., Passarella, A., Conti, M.: Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. IEEE Commun. Mag. 44(11), 134–141 (2006)Google Scholar
  2. 2.
    Kaps, J.-P.: Cryptography for ultra-low power devices, Ph.D. thesis, Worcester Polytechnic Institute (2006)Google Scholar
  3. 3.
    Aumasson, J.P., Henzen, L., Meier, W., Naya-Plasencia, M.: Quark: a lightweight hash. J. Cryptol. 26(2), 313–339 (2013)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Padmavathi, G.: A survey of attacks, security mechanisms and challenges in wireless sensor. Networks 4(1), 1–9 (2009)MathSciNetGoogle Scholar
  5. 5.
    Mandava, M., Lubamba, C., Ismail, A., Bagula, H., Bagula, A.: Cyber-healthcare for public healthcare in the developing world. In: Proceedings of the 2016 IEEE Symposium on Computers and Communication (ISCC), Messina-Italy, 27–30 June 2016, pp. 14–19 (2016)Google Scholar
  6. 6.
    Bagula, M., Bagula, H., Mandava, M., Kakoko, C., Bagula, A.: Cyber-healthcare kiosks for healthcare support in developing countries. In: Proceedings of the AFRICOMM 2018, Dakar-Senegal, 29–30 November 2018Google Scholar
  7. 7.
    Celesti, A., et al.: How to develop IoT cloud e-health systems based on FIWARE: a lesson learnt. J. Sens. Actuator Netw. 8(1), 7 (2019)CrossRefGoogle Scholar
  8. 8.
    Bagula, A., Mandava, M., Bagula, H.: A framework for healthcare support in the rural and low income areas of the developing world. J. Netw. Comput. Appl. 120, 17–29 (2018).  https://doi.org/10.1016/j.jnca.2018.06.010CrossRefGoogle Scholar
  9. 9.
    Bagula, A., Lubamba, C., Mandava, M., Bagula, H., Zennaro, M., Pietrosemoli, E.: Cloud based patient prioritization as service in public health care. In: 2016 ITU Kaleidoscope: ICTs for a Sustainable World (ITU WT), pp. 1–8. IEEE (2016)Google Scholar
  10. 10.
    Lubamba, C., Bagula, A.: Cyber-healthcare cloud computing interoperability using the HL7-CDA standard. In: 2017 IEEE Symposium on Computers and Communications (ISCC), pp. 105–110. IEEE, July 2017Google Scholar
  11. 11.
    Murillo, M.J., Aukin, M.: Application of wireless sensor nodes to a delay-tolerant health and environmental data communication system in remote communities. In: Proceedings of the 2011 IEEE Global Humanitarian Technology Conference, pp. 383–392, October 2011Google Scholar
  12. 12.
    Kate, A., Zaverucha, G.M., Hengartner, U.: Anonymity and security in delay tolerant networks. In: Proceedings of the 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007, pp. 504–513 (2007)Google Scholar
  13. 13.
    Seth, A., Keshav, S.: Practical security for disconnected nodes. In: Proceedings of the 1st IEEE ICNP Workshop on Secure Network Protocols, pp. 31–36 (2005)Google Scholar
  14. 14.
    Sastry, N., Wagner, D.: Security considerations for IEEE 802.15.4 networks. In: Proceedings of the 2004 ACM Workshop on Wireless security - WiSe 2004 (2004)Google Scholar
  15. 15.
    Bagula, A.B.: Modelling and implementation of QoS in wireless sensor networks: a multi-constrained traffic engineering model. EURASIP J. Wirel. Commun. Netw. 1, 1–14 (2010)Google Scholar
  16. 16.
    Bagula, A.B.: Hybrid traffic engineering: the least path interference algorithm. In: Proceedings of the 2004 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, pp. 89–96, South African Institute of Computer Scientists and Information Technologists (2004)Google Scholar
  17. 17.
    Bagula, A.B.: Hybrid routing in next generation IP networks. Comput. Commun. 29(7), 879–892 (2006)CrossRefGoogle Scholar
  18. 18.
    Bagula, A.B.: On achieveing bandwidth-aware LSP/LambdaSP multiplexing/separation in multi-layer networks. IEEE J. Sel. Areas Commun. 25, 987–1000 (2007)CrossRefGoogle Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2020

Authors and Affiliations

  • Antoine Bagula
    • 1
    • 2
    Email author
  • Lutando Ngaqwazai
    • 2
  • Claude Lubamba Kakoko
    • 2
  • Olasupo Ajayi
    • 1
    • 2
  1. 1.ISAT LaboratoryUniversity of the Western CapeCape TownSouth Africa
  2. 2.Department of Computer ScienceUniversity of the Western CapeCape TownSouth Africa

Personalised recommendations