Node-to-Node Secure Data Transmission Protocol for Low-power IoT Devices

被引:0
作者
Kurera, Chandradeepa [1 ]
Navoda, Dasun [1 ]
机构
[1] Univ Moratuwa, Katubedda, Sri Lanka
来源
2018 18TH INTERNATIONAL CONFERENCE ON ADVANCES IN ICT FOR EMERGING REGIONS (ICTER) CONFERENCE PROCEEDINGS | 2018年
关键词
IOT; Secure Data Transmission; Node to node data transmission; Transmission Protocol; Low-power IoT devices;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Through the internet and local networks, IoT devices exchange data. Most of the loT devices are low-power devices, meaning that they are designed to use less electric power. To secure data transmission, it is required to encrypt the messages. Encryption and decryption of messages are computationally expensive activities, thus require considerable amount of processing and memory power which is not affordable to low-power IoT devices. Therefore, not all secure transmission protocols are low-power IoT devices friendly. This study proposes a secure data transmission protocol for low-power IoT devices. The design inherits some features in Kerberos and one time password concepts. The protocol is designed for devices which are connected to each other, as in a fully connected network topology. The protocol uses symmetric key cryptography under the assumption of that the device specific keys are never being transmitted over the network. It resists DoS, message replay and Man-of-the-middle attacks while facilitating the key security concepts such as Authenticity, Confidentiality and Integrity. The designed protocol uses less number of encryption/ decryption cycles and maintain session based strong authentication to facilitate secure data transmission among nodes.
引用
收藏
页码:332 / 338
页数:7
相关论文
共 11 条
[1]  
[Anonymous], SPINS SECURITY PROTO
[2]   A replay-attack resistant Authentication Scheme for the Internet of Things [J].
Feng, Yuxiang ;
Wang, Wenhao ;
Weng, Yukai ;
Zhang, Huanming .
2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, :541-547
[3]  
Gaikwad PP, 2015, 2015 1ST INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), P262, DOI 10.1109/NGCT.2015.7375123
[4]  
Haller N. M., 1994, Proceedings Internet Society Symposium on Network and Distributed System Security 1994, P151
[5]  
Lai B., 2002, IEEE Workshop on Large Scale RealTime and Embedded Systems (LARTES), P7
[6]  
Lewis F. L., WIRELESS SENSOR NETW
[7]  
LIU A, TINYECC CONFIGURABLE
[8]  
Piotrowski Kr., 2006, PUBLIC KEY CRYPTOGRA, P169
[9]   Key management systems for sensor networks in the context of the Internet of Things [J].
Roman, Rodrigo ;
Alcaraz, Cristina ;
Lopez, Javier ;
Sklavos, Nicolas .
COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (02) :147-159
[10]  
Romdhani I., 2015, ARCHITECTING INTERNE