A decentralized scalable security framework for end-to-end authentication of future IoT communication

被引:69
作者
Sheron, P. S. Febin [1 ]
Sridhar, K. P. [1 ]
Baskar, S. [1 ]
Shakeel, P. Mohamed [2 ]
机构
[1] Karpagam Acad Higher Educ, Dept Elect & Commun, Coimbatore, Tamil Nadu, India
[2] Univ Tekn Malaysia Melaka, Fac Informat & Commun Technol, Melaka, Malaysia
关键词
INTERNET; NETWORK; SCHEME; MODEL; EDGE;
D O I
10.1002/ett.3815
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The development of Internet of Things (IoT) has granted multiple interoperable features for user to digital things communication. The future communication technology and service provisioning in IoT is large scaling an open environment. The large scale IoT environment is supported by sensor network and independent nodes. The intelligent computing, storage, and computation features of the nodes are inherited by the IoT paradigm for its application and service support. In such an open environment, security is a prominent issue that must be administered in a decentralized manner. In this manuscript, a decentralized and scalable security framework for future IoT is designed. This framework exploits the advantages of intelligent computing and tree-based hash for device and request authentication to provide device-to-device security. The tree-based hash is used for authenticating requests and the central authority-based security feature of the framework provides device level security, ensuring better privacy and integrity in communications. The experimental analysis of the proposed security framework is analyzed in terms of detection rate, communication loss, disconnection ratio, and delay.
引用
收藏
页数:12
相关论文
共 26 条
[1]   Enabling IoT platforms for social IoT applications: Vision, feature mapping, and challenges [J].
Afzal, Bilal ;
Umair, Muhammad ;
Shah, Ghalib Asadullah ;
Ahmed, Ejaz .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 92 :718-731
[2]   RDCM: An Efficient Real-Time Data Collection Model for IoT/WSN Edge With Multivariate Sensors [J].
Alduais, Nayef Abdulwahab Mohammed ;
Abdullah, Jiwa ;
Jamil, Ansar .
IEEE ACCESS, 2019, 7 :89063-89082
[3]   A fuzzy security protocol for trust management in the internet of things (Fuzzy-IoT) [J].
Alshehri, Mohammad Dahman ;
Hussain, Farookh Khadeer .
COMPUTING, 2019, 101 (07) :791-818
[4]  
[Anonymous], 2018, MOB NETW APPL
[5]   An energy persistent Range-dependent Regulated Transmission Communication model for vehicular network applications [J].
Baskar, S. ;
Periyanayagi, S. ;
Shakeel, P. Mohamed ;
Dhulipala, V. R. Sarma .
COMPUTER NETWORKS, 2019, 152 :144-153
[6]   A Review of Security in Internet of Things [J].
Harbi, Yasmine ;
Aliouat, Zibouda ;
Harous, Saad ;
Bentaleb, Abdelhak ;
Refoufi, Allaoua .
WIRELESS PERSONAL COMMUNICATIONS, 2019, 108 (01) :325-344
[7]   A sector-based random routing scheme for protecting the source location privacy in WSNs for the Internet of Things [J].
He, Yu ;
Han, Guangjie ;
Wang, Hao ;
Ansere, James Adu ;
Zhang, Whenbo .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 96 :438-448
[8]   MEQSA-OLSRv2: A Multicriteria-Based Hybrid Multipath Protocol for Energy-Efficient and QoS-Aware Data Routing in MANET-WSN Convergence Scenarios of IoT [J].
Jabbar, Waheb A. ;
Saad, Wasan Kadhim ;
Ismail, Mahamod .
IEEE ACCESS, 2018, 6 :76546-76572
[9]   Internet of things security: A top-down survey [J].
Kouicem, Djamel Eddine ;
Bouabdallah, Abdelmadjid ;
Lakhlef, Hicham .
COMPUTER NETWORKS, 2018, 141 :199-221
[10]   RETRACTED: Information security model of block chain based on intrusion sensing in the IoT environment (Retracted article. See DEC, 2022) [J].
Li, Daming ;
Cai, Zhiming ;
Deng, Lianbing ;
Yao, Xiang ;
Wang, Harry Haoxiang .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1) :451-468