E-HIP: An Energy-Efficient OpenHIP-Based Security in Internet of Things Networks

被引:7
作者
Kanuch, Peter [1 ]
Macko, Dominik [1 ]
机构
[1] Slovak Univ Technol Bratislava, Fac Informat & Informat Technol, Ilkovicova 2, Bratislava 84216, Slovakia
关键词
energy efficiency; internet of things; low power; communication security; wireless sensor networks; PROTOCOL;
D O I
10.3390/s19224921
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The rapidly growing segment of the Internet of Things (IoT) makes the security threats more prominent than ever. The research around communication security and cybersecurity in such networks is still a challenge, mainly due to the typically limited energy and computation resources of IoT devices. The strong security mechanisms require significant power and thus the energy wastage must be minimized. Optimized application-specific security protocols are commonly used to make the data transfer more efficient, while still offering a high level of security. The supported security features, such as confidentiality, integrity or authenticity, should not be affected by the optimization. Our work is focused on optimizing one of the existing security protocols for the use in the IoT area, namely the Host Identity Protocol (HIP). Based on the analysis of related works, we have identified multiple possibilities for optimization and combined some of them into the proposed E-HIP optimized protocol. For verification purpose, it has been implemented as a modification of the open-source OpenHIP library and applied on a communication between real hardware devices. The secured communication worked correctly. The resulting effect of the proposed optimization has been evaluated experimentally and it represents an increase in energy efficiency by about 20%. Compared to other HIP optimizations, the achieved results are similar; however, the proposed optimizations are unique and can be further combined with some of the existing ones to achieve even higher efficiency.
引用
收藏
页数:17
相关论文
共 28 条
  • [1] Abid N., 2009, HAL01360031 CGAS
  • [2] [Anonymous], 2016, NIST SPEC PUBL
  • [3] Aura T, 2005, LECT NOTES COMPUT SC, V3574, P481
  • [4] Banerjee U., 2017, GLOBECOM 2017 2017 I, P2014, DOI DOI 10.1109/GLOCOM.2017.8255053
  • [5] Bartje J., TOP 10 IOT APPL AREA
  • [6] Bokor L, 2009, MSWIM09
  • [7] PROCEEDINGS OF THE 12TH ACM INTERNATIONAL CONFERENCE ON MODELING, ANALYSIS, AND SYSTEMS, P124
  • [8] Bonetto R., 2012, 2012 IEEE INT S WORL, P686, DOI DOI 10.1109/WOWMOM.2012.6263790
  • [9] Davis Dwight B., Istr 2019: Internet of things cyber attacks grow more
  • [10] Internet of Things: a definition & taxonomy
    Dorsemaine, Bruno
    Gaulier, Jean-Philippe
    Wary, Jean-Philippe
    Kheir, Nizar
    Urien, Pascal
    [J]. 2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015), 2015, : 72 - 76