Lightweight Secure and Scalable Scheme for Data Transmission in the Internet of Things

被引:7
作者
Al-Hejri, Ibraheem [1 ]
Azzedin, Farag [1 ]
Almuhammadi, Sultan [1 ]
Eltoweissy, Mohamed [2 ]
机构
[1] King Fahd Univ Petr & Minerals, Informat & Comp Sci Dept, Dhahran 31261, Eastern Provinc, Saudi Arabia
[2] Morgan State Univ, Sch Comp Math & Nat Sci, Baltimore, MD 22051 USA
关键词
Internet of Things; Secure data transmission; Lightweight schemes; Scalability; Elliptic curve cryptography; EFFICIENT; IOT; MULTIPLICATION; COMMUNICATION; ENCRYPTION; ALGORITHMS;
D O I
10.1007/s13369-024-08884-z
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The Internet of Things (IoT) is rapidly permeating critical domains, enabling the interconnection and utilization of diverse devices on a large scale while streaming vast volumes of data. In domains like telehealth, intelligent transportation, and autonomous agriculture, ensuring the confidentiality, integrity, and authenticity of collected and exchanged data is paramount. However, the resource limitations and heterogeneous nature of IoT devices often render traditional cryptography-based techniques ineffective or even infeasible for secure data transmission. Consequently, there is an urgent need to develop and implement lightweight, secure, and scalable schemes for data transmission. In this paper, we propose a novel Lightweight Secure and Scalable Scheme (LS3) for data transmission in IoT environments. LS3 is comprised of three phases and utilizes an efficient combination of symmetric keys and Elliptic Curve Menezes-Qu-Vanstone asymmetric key agreement protocol. Through a comprehensive analysis, we demonstrate that LS3 excels in terms of security and scalability and outperforms other existing schemes in terms of computation and communication costs.
引用
收藏
页码:12919 / 12934
页数:16
相关论文
共 88 条
[1]   Security in Internet of Things: issues, challenges, taxonomy, and architecture [J].
Adat, Vipindev ;
Gupta, B. B. .
TELECOMMUNICATION SYSTEMS, 2018, 67 (03) :423-441
[2]  
AL MOGBIL R., 2020, 2020 INT C COMP INF, P1
[3]  
Alam T., 2020, Electron. Comput. Eng, DOI [10.2139/ssrn.3639058, DOI 10.2139/SSRN.3639058]
[4]   Reconfigurable Hardware Architecture for Authenticated Key Agreement Protocol Over Binary Edwards Curve [J].
Anandakumar, N. Nalla ;
Das, M. Prem Laxman ;
Sanadhya, Somitra K. ;
Hashmi, Mohammad S. .
ACM TRANSACTIONS ON RECONFIGURABLE TECHNOLOGY AND SYSTEMS, 2018, 11 (02)
[5]  
[Anonymous], 2007, P 2 ACM S INF COMM S
[6]   An Authentication-Based Secure Data Aggregation Method in Internet of Things [J].
Ataei Nezhad, Maryam ;
Barati, Hamid ;
Barati, Ali .
JOURNAL OF GRID COMPUTING, 2022, 20 (03)
[7]   Secure Data Distribution Architecture in IoT Using MQTT [J].
Azzedin, Farag ;
Alhazmi, Turki .
APPLIED SCIENCES-BASEL, 2023, 13 (04)
[8]   An Asset-Based Approach to Mitigate Zero-Day Ransomware Attacks [J].
Azzedin, Farag ;
Suwad, Husam ;
Rahman, Md Mahfuzur .
CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (02) :3003-3020
[9]   Countermeasureing Zero Day Attacks: Asset-Based Approach [J].
Azzedin, Farag ;
Suwad, Husam ;
Alyafeai, Zaid .
2017 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS), 2017, :854-857
[10]   Efficient and Secure Data Transmission and Sinkhole Detection in a Multi-Clustering Wireless Sensor Network Based on Homomorphic Encryption and Watermarking [J].
Babaeer, Huda A. ;
Al-Ahmadi, Saad A. .
IEEE ACCESS, 2020, 8 :92098-92109