Skip to main content

Secure Transfer Protocol Between App and Device of Internet of Things

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10658))

Abstract

Communication security is one of the key component of Internet of Things. Now we can communicate with smart device, such as microwave oven, camera, and control it using App in our smart phone, but due to the poor computing power of smart device, it tends to be intractable to protect this communication from attack. By analyzing the security threats faced during the process of smart device and App authenticating each other’s identity, this paper proposed a lightweight transfer protocol for smart device, and introduced “Authentication Center” to help with authentication for smart device and App. In consideration of poor computing power of smart device, the lightweight protocol achieves effective reduction of network resource usage. Acting as a hub, the Authentication Center does the heavy certification and authorization work as well as the management of smart device. This protocol can protect data confidentiality, data integrity against replay attack, man-in-the-middle attack by ensuring the identities of device and App with the help of Authentication Center.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Stallings, W.: Cryptography and Network Security Principles and Practices, 4th edn. Prentice Hall, New Jersey (2005)

    Google Scholar 

  2. Saltzer, J., Schroder, M.: The protection of information in computer systems. Proc. IEEE 63(9), 1278–1308 (1975)

    Article  Google Scholar 

  3. Harn, L., Ren, J.: Design of fully deniable authentication service for e-mail applications. IEEE Commun. Lett. 12(3), 219–221 (2008)

    Google Scholar 

  4. Feistel, H., Notz, W., Smith, J.: Cryptographic techniques for machine to machine data communications. Proc. IEEE 63(11), 1545–1554 (1975)

    Article  Google Scholar 

  5. Chou, W.: Inside SSL: accelerating secure transactions. IT Prof. 4(5), 37–41 (2002)

    Article  Google Scholar 

  6. Campbell, C.: Design and specification of cryptographic capabilities. In: Computer Security and the Data Encryption Standard, pp. 54–56. NBS Special Publication 500–27, February 1978

    Google Scholar 

  7. Oppliger, R.: Security at the internet layer. Computer 31, 43–47 (1998)

    Article  Google Scholar 

  8. Stewart, R.: Stream Control Transmission Protocol. RFC4960, September 2007

    Google Scholar 

  9. Ono, K., Schulzrine, H.: The impact of SCTP on SIP server scalability and performance. In: IEEE GLOBECOM, November 2008

    Google Scholar 

  10. Khalifa, T., Naik, K., Alsabaan, M., Nayak, A., Goel, N.: Transport protocol for smart grid infrastructure. In: IEEE UFN, June 2010

    Google Scholar 

  11. Braden, R.: Requirements for Internet Hosts - Communication Layers. RFC1122, October 1989

    Google Scholar 

  12. Bakken, D., Hauser, C., Gjermundrod, H.: Delivery Requirements and Implementation

    Google Scholar 

  13. Aboba, B.: Extesible Authentication Protocol (EAP) [S]. RFC3748, June 2004

    Google Scholar 

  14. Network Working Group. RFC2867 RADIUS Accounting Modifications for Tunnel Protocol Support, June 2000

    Google Scholar 

  15. Network Working Group. RFC2868 Attributes for Tunnel Protocol Support, June 2000

    Google Scholar 

  16. Network Working Group. RFC3575 IANA Consideration for RADIUS, July 2003

    Google Scholar 

  17. Zhang, L., Tiwana, B., Qian, Z., Wang, Z., Dick, R.P., Mao, Z.M., Yang, L.: Accurate online power estimation and automatic battery behavior based power model generation for smart phones. In: Proceedings of the Eighth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis, CODES/ISSS 2010, pp. 105–114. ACM, New York (2010). http://dx.doi.org/10.1145/1878961.1878982

Download references

Acknowledgments

This work is supported by the National Key Research and Development Program of China (No. 2016QY03D0605), the National Nature Science Foundation of China (Nos. 61672111, 61370069), and Beijing Natural Science Foundation (No. 4162043).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhaojie Xu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xu, Z., Li, X. (2017). Secure Transfer Protocol Between App and Device of Internet of Things. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, KK. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2017. Lecture Notes in Computer Science(), vol 10658. Springer, Cham. https://doi.org/10.1007/978-3-319-72395-2_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-72395-2_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-72394-5

  • Online ISBN: 978-3-319-72395-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics