Hybrid Internet of Things (IoT) data transmission security corresponding to device verification

被引:8
作者
Jian, Ming-Shen [1 ]
Wu, Jimmy Ming-Tai [2 ]
机构
[1] Natl Formosa Univ, Cloud Comp & Intelligent Syst Lab, Huwei, Taiwan
[2] Shandong Univ Sci & Technol, Qingdao, Peoples R China
关键词
Internet Of Things; Data security; Verification; Network; Cryptography; AUTHENTICATION SCHEME; THREATS; TRUST;
D O I
10.1007/s12652-021-03122-y
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet Of Things (IoT) devices are popular and deployed generally. Due to the wireless data transmission between each IoT device and remote service hosts, considering the security of data, the data transmission with security is needed. With less manual operation assistance, to make IoT service configuration automatically done well with security, the way to exchange the security key and identification each other becomes an important issue. In this research, Hybrid Internet Of Things (IoT) Data Transmission Security corresponding to Device Verification is proposed. Each IoT device can be differentiated and identified individually. The IoT device can provide its own security independent from another. Based on the unique MAC address of each IoT device, each device can be identified individually. According to the verification result, the public key of asymmetric cryptosystem can be obtained. Based on asymmetric cryptosystem, the common key from 20 to 200 bytes can be exchanged and decrypted at a local service server less than 0.3 s. The transmission time in LAN can be less than 0.1 s. Corresponding to the various data length from 20 bytes to 1 MB, the encryption time delay at an IoT device is about 0.5 s and the decryption time delay at a local service server is about 0.4 s. Furthermore, the time delay for the data encryption at the IoT device, transmission in LAN, and decryption at a local service will cost less than 1 s. The verification shows the acceptable cost of the proposed application with the hybrid cryptosystem.
引用
收藏
页数:10
相关论文
共 35 条
[1]   A Survey on Security and Privacy Issues in Edge-Computing-Assisted Internet of Things [J].
Alwarafy, Abdulmalik ;
Al-Thelaya, Khaled A. ;
Abdallah, Mohamed ;
Schneider, Jens ;
Hamdi, Mounir .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (06) :4004-4022
[2]   Network Intrusion Detection for IoT Security Based on Learning Techniques [J].
Chaabouni, Nadia ;
Mosbah, Mohamed ;
Zemmari, Akka ;
Sauvignac, Cyrille ;
Faruki, Parvez .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (03) :2671-2701
[3]   Interdependent Strategic Security Risk Management With Bounded Rationality in the Internet of Things [J].
Chen, Juntao ;
Zhu, Quanyan .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (11) :2958-2971
[4]   A Secure and Efficient Parallel-Dependency RFID Grouping-Proof Protocol [J].
Cherneva, Vanya ;
Trahan, Jerry L. .
IEEE JOURNAL OF RADIO FREQUENCY IDENTIFICATION, 2020, 4 (01) :14-23
[5]   IoTsafe, Decoupling Security From Applications for a Safer IoT [J].
de Hoz Diego, Jorge David ;
Saldana, Jose ;
Fernandez-Navajas, Julian ;
Ruiz-Mas, Jose .
IEEE ACCESS, 2019, 7 :29942-29962
[6]   Evaluating Critical Security Issues of the IoT World: Present and Future Challenges [J].
Frustaci, Mario ;
Pace, Pasquale ;
Aloi, Gianluca ;
Fortino, Giancarlo .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04) :2483-2495
[7]   Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0 [J].
Garg, Sahil ;
Kaur, Kuljeet ;
Kaddoum, Georges ;
Choo, Kim-Kwang Raymond .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (05) :4598-4606
[8]   A Lightweight ECC-Based Authentication Scheme for Internet of Things (IoT) [J].
Hammi, Badis ;
Fayad, Achraf ;
Khatoun, Rida ;
Zeadally, Sherali ;
Begriche, Youcef .
IEEE SYSTEMS JOURNAL, 2020, 14 (03) :3440-3450
[9]   A Collaborative PHY-Aided Technique For End-to-End IoT Device Authentication [J].
Hao, Peng ;
Wang, Xianbin ;
Shen, Weiming .
IEEE ACCESS, 2018, 6 :42279-42293
[10]   A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures [J].
Hassija, Vikas ;
Chamola, Vinay ;
Saxena, Vikas ;
Jain, Divyansh ;
Goyal, Pranav ;
Sikdar, Biplab .
IEEE ACCESS, 2019, 7 :82721-82743