A Lightweight and Secure IoT Communication Framework in Content-Centric Network Using Elliptic Curve Cryptography
In the recent era, content-centric network (CCN) is emerging as a future Internet paradigm to leverage scalable content distribution. Similarly, the Internet of things (IoT) is another upcoming technology which integrates as well as manages heterogeneous connected devices over the Internet. Recent literature have shown that IoT architecture can efficiently perform if it is implemented in CCN environment. In addition, considering the openness of the Internet used in IoT communication and limited capacity of IoT devices, security becomes a serious challenge which demands attention of the research community. In this paper, our main objective is to design a secure IoT communication framework that operates in CCN. A certificateless public key infrastructure is designed for our resource-constrained IoT communication framework in CCN. We have incorporated elliptic curve cryptography (ECC), a state-of-the-art lightweight cryptosystem, to ensure security of the proposed scheme. Finally, an in-depth security analysis confirms that the proposed scheme is resistant to various relevant cryptographic attacks.
KeywordsContent-centric network (CCN) Internet of things (IoT) Elliptic curve cryptography (ECC)
This work is financially supported by Visvesvaraya Ph.D. Scheme, Ministry of Electronics and Information Technology, Government of India.
- 1.Jacobson, V., Smetters, D. K., Thornton, J. D., Plass, M. F., Briggs, N. H., Braynard, R. L. (2009). Networking named content. In Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies (pp. 1–12). ACM.Google Scholar
- 2.Smetters, D., Jacobson, V. (2009). Securing network content (pp. 2009–01). Technical report, PARC.Google Scholar
- 3.Mahadevan, P. (2014). CCNx 1.0 Tutorial. Technical report, PARC.Google Scholar
- 4.Kuriharay, J., Uzun, E., Wood, C. A. (2015). An encryption-based access control framework for content-centric networking. In 2015 IFIP Networking Conference (IFIP Networking) (pp. 1–9). IEEE.Google Scholar
- 5.Li, S., Da Xu, L. (2017). Securing the internet of things. Syngress.Google Scholar
- 7.François, J., Cholez, T., Engel, T. (2013). CCN traffic optimization for IoT. In 2013 Fourth International Conference on the Network of the Future (NOF) (pp. 1–5). IEEE..Google Scholar
- 8.Baccelli, E., Mehlis, C., Hahm, O., Schmidt, T. C., Wählisch, M. (2014). Information centric networking in the IoT: experiments with NDN in the wild. In Proceedings of the 1st ACM Conference on Information-Centric Networking (pp. 77–86). ACM.Google Scholar
- 9.Quevedo, J., Corujo, D., Aguiar, R. (2014). A case for ICN usage in IoT environments. In Global Communications Conference (GLOBECOM) (pp. 2770–2775). IEEE.Google Scholar
- 10.Ahlgren, B., Lindgren, A., Wu, Y. (2016). Experimental Feasibility Study of CCN-lite on Contiki Motes for IoT Data Streams. In Proceedings of the 3rd ACM Conference on Information-Centric Networking (pp. 221–222). ACM.Google Scholar
- 12.Hankerson, D., Menezes, A. J., Vanstone, S. (2006). Guide to elliptic curve cryptography. Springer Science and Business Media.Google Scholar
- 13.Stallings, W. (2006). Cryptography and network security: principles and practices. Pearson Education India.Google Scholar
- 14.Miller, V. S. (1985). Use of elliptic curves in cryptography. In: Conference on the Theory and Application of Cryptographic Techniques (pp. 417–426). Berlin, Heidelberg: Springer.Google Scholar