A Distributed Security Protocol Designed for the Context of Internet of Things

被引:0
作者
Laouid, Abdelkader [1 ]
AlShaikh, Muath [2 ]
Lalem, Farid [2 ]
Bounceur, Ahcene [2 ]
Euler, Reinhardt [2 ]
Bezoui, Madani [3 ]
Aissaoua, Habib [4 ]
Tari, Abdelkamel [5 ]
机构
[1] Univ El Oued, El Oued, Algeria
[2] Univ Western Brittany UBO, Lab STICC, UMR CNRS 6285, Brest, France
[3] Univ Boumerdes, Dept Math, Boumerdes, Algeria
[4] Univ Setif, Dept Comp Sci, Setif, Algeria
[5] Univ Bejaia, Bejaia, Algeria
来源
ICFNDS'18: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS | 2018年
关键词
IoT; Distributed algorithms; Security; SCHEME;
D O I
10.1145/3231053.3231079
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the field of Internet of Things (IoT), many encryption protocols for distributed wireless communication technology have been proposed for use in various applications such as monitoring, healthcare, product management, workplace, home support and surveillance [1]. An IoT system can be looked at as a highly dynamic distributed and networked system composed of a large number of smart devices. In fact, such connected devices suffer from the limitation of resources in terms of computing, energy, bandwidth and storage. Hence, IoT application scenarios require methods to adapt to highly diverse contexts with different available resources and possibly dynamic environments. In this paper, we address these issues by proposing an efficient technique for data protection in the context of IoT. A distributed network architecture is used, where each node is in charge to deliver and/or forward data. The aim is to use efficient operations to protect the exchanged data. The proposed technique ensures the exchanged data to be effectively and securely controlled with a low overhead compared to the classical approaches. The proposed protocol shows its efficiency in terms of overhead, speed, energy and security measurements.
引用
收藏
页数:5
相关论文
共 18 条
  • [1] Efficient and robust encryption and watermarking technique based on a new chaotic map approach
    AlShaikh, Muath
    Laouamer, Lamri
    Nana, Laurent
    Pascu, Anca Chrisitine
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (06) : 8937 - 8950
  • [2] AlShaikh M, 2016, INT J COMPUT SCI NET, V16, P62
  • [3] Algorithms for Lightweight Key Exchange
    Alvarez, Rafael
    Caballero-Gil, Candido
    Santonja, Juan
    Zamora, Antonio
    [J]. SENSORS, 2017, 17 (07)
  • [4] [Anonymous], 2014, P 2014 4 INT C WIR C, DOI DOI 10.1109/VITAE.2014.6934425
  • [5] Atwady Y., 2017, P INT C FUT NETW DIS, P8
  • [6] A survey of key distribution in wireless sensor networks
    Chen, Chi-Yuan
    Chao, Han-Chieh
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2495 - 2508
  • [7] Dong Chen, 2012, International Journal of Wireless and Mobile Computing, V5, P191, DOI 10.1504/IJWMC.2012.046773
  • [8] Fu Y., 2017, MOBILE INFORM SYSTEM, V2017
  • [9] A Survey on Network Security Monitoring Systems
    Ghafir, Ibrahim
    Prenosil, Vaclav
    Svoboda, Jakub
    Hammoudeh, Mohammad
    [J]. 2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW), 2016, : 77 - 82
  • [10] A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment
    Jan, Mian Ahmad
    Nanda, Priyadarsi
    He, Xiangjian
    Tan, Zhiyuan
    Liu, Ren Ping
    [J]. 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 205 - 211