OnboardICNg: a Secure Protocol for On-boarding IoT Devices in ICN

被引:23
|
作者
Compagno, Alberto [1 ]
Conti, Mauro [2 ]
Droms, Ralph [3 ]
机构
[1] Sapienza Univ Rome, Rome, Italy
[2] Univ Padua, I-35100 Padua, Italy
[3] Cisco Syst, San Jose, CA USA
来源
PROCEEDINGS OF THE 2016 3RD ACM CONFERENCE ON INFORMATION-CENTRIC NETWORKING (ACM-ICN '16) | 2016年
关键词
ICN Security; Internet-of-things; Authentication;
D O I
10.1145/2984356.2984374
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Information-Centric Networking (ICN) is an emerging networking paradigm that focuses on content distribution and aims at replacing the current IP stack. Implementations of ICN have demonstrated its advantages over IP, in terms of network performance and resource requirements. Because of these advantages, ICN is also considered to be a good network paradigm candidate for the Internet-of-Things (IoT), especially in scenarios involving resource constrained devices. In this paper we propose OnboardICNg, the first secure protocol for on-boarding (authenticating and authorizing) IoT devices in ICN mesh networks. OnboardICNg can securely onboard resource constrained devices into an existing IoT network, outperforming the authentication protocol selected for the ZigBee-IP specification: EAP-PANA, i.e., the Protocol for carrying Authentication for Network Access (PANA) combined with the Extensible Authentication Protocol (EAP). In particular we show that, compared with EAP-PANA, OnboardICNg reduces the communication and energy consumption, by 87% and 66%, respectively.
引用
收藏
页码:166 / 175
页数:10
相关论文
共 50 条
  • [1] A Secure ICN-IoT Architecture
    Sicari, Sabrina
    Rizzardi, Alessandra
    Grieco, Luigi Alfredo
    Coen-Porisini, Alberto
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2017, : 259 - 264
  • [2] Verifying a secure authentication protocol for IoT medical devices
    Woo-Sik Bae
    Cluster Computing, 2019, 22 : 1985 - 1990
  • [3] Verifying a secure authentication protocol for IoT medical devices
    Bae, Woo-Sik
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1985 - 1990
  • [4] Trust Schemas and ICN: Key to Secure Home IoT
    Nichols, Kathleen
    PROCEEDINGS OF THE 2021 8TH ACM CONFERENCE ON INFORMATION-CENTRIC NETWORKING (ICN '21), 2021, : 95 - 106
  • [5] SECURE IOT DEVICES
    Shah, Agam
    MECHANICAL ENGINEERING, 2019, 141 (03) : 19 - 19
  • [6] Multi-Institutional Breast Cancer Detection Using a Secure On-Boarding Service for Distributed Analytics
    Welten, Sascha
    Hempel, Lars
    Abedi, Masoud
    Mou, Yongli
    Jaberansary, Mehrshad
    Neumann, Laurenz
    Weber, Sven
    Tahar, Kais
    Yediel, Yeliz Ucer
    Loebe, Matthias
    Decker, Stefan
    Beyan, Oya
    Kirsten, Toralf
    APPLIED SCIENCES-BASEL, 2022, 12 (09):
  • [7] Enhanced secure transaction protocol for IoT devices via LTE network
    Al-Alkeem E.
    Yeun C.Y.
    Al Hammadi Y.
    Yeun H.K.
    Byon Y.-J.
    Transactions of the Korean Institute of Electrical Engineers, 2017, 66 (12): : 1921 - 1936
  • [8] A secure IoT-based micro-payment protocol for wearable devices
    Bojjagani, Sriramulu
    Rao, P. V. Venkateswara
    Vemula, Dinesh Reddy
    Reddy, B. Ramachandra
    Lakshmi, T. Jaya
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (02) : 1163 - 1188
  • [9] ECCbAP: A secure ECC-based authentication protocol for IoT edge devices
    Rostampour S.
    Safkhani M.
    Bendavid Y.
    Bagheri N.
    Pervasive and Mobile Computing, 2020, 67
  • [10] A PUF based Light Weight Protocol for Secure WiFi Authentication of IoT devices
    Mahalat, Mahabub Hasan
    Saha, Shreya
    Mondal, Anindan
    Sen, Bibhash
    PROCEEDINGS OF THE 2018 8TH INTERNATIONAL SYMPOSIUM ON EMBEDDED COMPUTING AND SYSTEM DESIGN (ISED 2018), 2018, : 183 - 187