1,688 research outputs found
The Meeting of Acquaintances: A Cost-efficient Authentication Scheme for Light-weight Objects with Transient Trust Level and Plurality Approach
Wireless sensor networks consist of a large number of distributed sensor
nodes so that potential risks are becoming more and more unpredictable. The new
entrants pose the potential risks when they move into the secure zone. To build
a door wall that provides safe and secured for the system, many recent research
works applied the initial authentication process. However, the majority of the
previous articles only focused on the Central Authority (CA) since this leads
to an increase in the computation cost and energy consumption for the specific
cases on the Internet of Things (IoT). Hence, in this article, we will lessen
the importance of these third parties through proposing an enhanced
authentication mechanism that includes key management and evaluation based on
the past interactions to assist the objects joining a secured area without any
nearby CA. We refer to a mobility dataset from CRAWDAD collected at the
University Politehnica of Bucharest and rebuild into a new random dataset
larger than the old one. The new one is an input for a simulated authenticating
algorithm to observe the communication cost and resource usage of devices. Our
proposal helps the authenticating flexible, being strict with unknown devices
into the secured zone. The threshold of maximum friends can modify based on the
optimization of the symmetric-key algorithm to diminish communication costs
(our experimental results compare to previous schemes less than 2000 bits) and
raise flexibility in resource-constrained environments.Comment: 27 page
A secure lightweight authentication mechanism for IoT devices in generic domain
The Internet of Things prompt deployment enhances the security concerns of these systems in recent years. The enormous exchange of sensory information between devices raises the necessity for a secure authentication scheme for Internet of Things devices. Despite many proposed schemes, providing authenticated and secure communication for Internet of Things devices is still an open issue. This research addresses challenges pertaining to the Internet of Things authentication, verification, and communication, and proposes a new secure lightweight mechanism for Internet of Things devices in the generic domain. The proposed authentication method utilizes environmental variables obtained by sensors to allow the system to identify genuine devices and reject anomalous connections
Contributions to Securing Software Updates in IoT
The Internet of Things (IoT) is a large network of connected devices. In IoT, devices can communicate with each other or back-end systems to transfer data or perform assigned tasks. Communication protocols used in IoT depend on target applications but usually require low bandwidth. On the other hand, IoT devices are constrained, having limited resources, including memory, power, and computational resources. Considering these limitations in IoT environments, it is difficult to implement best security practices. Consequently, network attacks can threaten devices or the data they transfer. Thus it is crucial to react quickly to emerging vulnerabilities. These vulnerabilities should be mitigated by firmware updates or other necessary updates securely. Since IoT devices usually connect to the network wirelessly, such updates can be performed Over-The-Air (OTA). This dissertation presents contributions to enable secure OTA software updates in IoT. In order to perform secure updates, vulnerabilities must first be identified and assessed. In this dissertation, first, we present our contribution to designing a maturity model for vulnerability handling. Next, we analyze and compare common communication protocols and security practices regarding energy consumption. Finally, we describe our designed lightweight protocol for OTA updates targeting constrained IoT devices. IoT devices and back-end systems often use incompatible protocols that are unable to interoperate securely. This dissertation also includes our contribution to designing a secure protocol translator for IoT. This translation is performed inside a Trusted Execution Environment (TEE) with TLS interception. This dissertation also contains our contribution to key management and key distribution in IoT networks. In performing secure software updates, the IoT devices can be grouped since the updates target a large number of devices. Thus, prior to deploying updates, a group key needs to be established among group members. In this dissertation, we present our designed secure group key establishment scheme. Symmetric key cryptography can help to save IoT device resources at the cost of increased key management complexity. This trade-off can be improved by integrating IoT networks with cloud computing and Software Defined Networking (SDN).In this dissertation, we use SDN in cloud networks to provision symmetric keys efficiently and securely. These pieces together help software developers and maintainers identify vulnerabilities, provision secret keys, and perform lightweight secure OTA updates. Furthermore, they help devices and systems with incompatible protocols to be able to interoperate
LMGROUP: A Lightweight Multicast Group Key Management for IoT Networks
Due to limitations of IoT networks including limited bandwidth, memory, battery, etc., secure multicast group communication has gained more attention, and to enable that a group key establishment scheme is required to share the secret key among the group members. The current group key establishment protocols were mostly designed for Wireless Sensor Network, and they require device interaction, high computation costs, or high storage on the device side. To address these drawbacks, in this paper we design LMGROUP, a lightweight and multicast group key establishment protocol for IoT networks, that is based on Elliptic Curve Integrated Encryption Scheme and HMAC verification and does not require device interaction. We also suggest an algorithm for unpredictable group member selection. Our experimental result of implementing LMGROUP indicates it has low storage, low computation, and low communication costs. Furthermore, the formal security verification indicates LMGROUP is secure and robust against different attacks
REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs
Healthcare institutions require advanced technology to collect patients' data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency. The existing research has serious drawbacks when using public-key mechanisms such as digital signature algorithms. In this paper, we propose Reliable and Efficient Integrity Scheme for Data Collection in HWSN (REISCH) to alleviate these problems by using secure and lightweight signature algorithms. The results of the performance analysis indicate that our scheme provides high efficiency in data integration between sensors and server (saves more than 24% of alive sensors compared to traditional algorithms). Additionally, we use Automated Validation of Internet Security Protocols and Applications (AVISPA) to validate the security procedures in our scheme. Security analysis results confirm that REISCH is safe against some well-known attacks
A Taxonomy and Review of Lightweight Blockchain Solutions for Internet of Things Networks
Internet of things networks have spread to most digital applications in the
past years. Examples of these networks include smart home networks, wireless
sensor networks, Internet of Flying Things, and many others. One of the main
difficulties that confront these networks is the security of their information
and communications. A large number of solutions have been proposed to safeguard
these networks from various types of cyberattacks. Among these solutions is the
blockchain, which gained popularity in the last few years due to its strong
security characteristics, such as immutability, cryptography, and distributed
consensus. However, implementing the blockchain framework within the devices of
these networks is very challenging, due to the limited resources of these
devices and the resource-demanding requirements of the blockchain. For this
reason, a large number of researchers proposed various types of lightweight
blockchain solutions for resource-constrained networks. The "lightweight"
aspect can be related to the blockchain architecture, device authentication,
cryptography model, consensus algorithm, or storage method. In this paper, we
present a taxonomy of the lightweight blockchain solutions that have been
proposed in the literature and discuss the different methods that have been
applied so far in each "lightweight" category. Our review highlights the
missing points in existing systems and paves the way to building a complete
lightweight blockchain solution for resource-constrained networks.Comment: 64 pages, 11 figures
Recommended from our members
IoT-based Activities of Daily Living for Abnormal Behaviour Detection: Privacy Issues and Potential Countermeasures
Activities of Daily Living (ADL) systems have been playing an important role in assessing and monitoring the quality of life of elderly people for many years. With the recent advancement and integration of Internet of Things (IoT) devices within the ADL systems, the number and quality of services offered has increased significantly. One of these vital services is abnormal behaviour detection based on the data collected from IoT devices within smart homes. However, the IoT data collected could have enormous privacy implications on smart home users if the data is not handled properly. We address this issue by analysing a generic ADL system for abnormal behaviour detection, including its entities and their interactions. We highlight three major privacy issues: (i) identity privacy, (ii) data confidentiality, and (iii) metadata data leakage. These issues are particularly relevant to ADL systems and we propose potential countermeasures to tackle them. Finally, we sketch a privacy-preserving version of a state-of-the-art ADL system to demonstrate the effectiveness of our proposed countermeasures, before suggesting future research directions
- …