Secure Communication Model for Constrained Internet of Things Devices
Keywords:
Security, Communications, Internet of Things, Symmetric cryptosystem, Asymmetric cryptosystemAbstract
Internet of Things (IoT) devices are rapidly on the way to becoming a necessary component of our daily life. These tools are efficient at accomplishing a particular task because of their specialized abilities. The IoT platform involves a variety of devices, from less resource-constrained to wireless sensors. These devices are vulnerable to network and hardware/software assaults. Securing communication with constrained IoT devices is crucial to maintaining the privacy of user sensitive information. This study suggested an approach for data protection and secure connectivity that can be deployed as an IoT security system. A symmetric approach is used to encrypt plaintext data devices before storing, and an asymmetric cryptosystem is used for protecting the cloud services and IoT service gateway. The encrypted data can be stored/retrieved based on cloud service requests. Also, plain-text data appears on the client interface whenever needed. Performance measurement of Message Queue Telemetry Transport (MQTT) and Hyper Text Transfer Protocol (HTTP) are illustrated. The outcomes indicate the way the framework works to reduce security threats and guarantee the integrity of the presented IoT model.
Downloads
References
A. Gerodimos, L. Maglaras, M. A. Ferrag, N. Ayres, and I. Kantzavelou, “IoT: Communication protocols and security threats,” Internet of Things and Cyber-Physical Systems, vol. 3, pp.1-13, 2023.
S. Bhattacharjya and H. Saiedian, “A Novel Simplified Framework to Secure IoT Communications,” In Proceedings of the 7th International Conference on Information Systems Security and Privacy (ICISSP), pp. 399-406, 2021.
M. Goworko and J. Wytrebowicz, “A Secure Communication System for Constrained IoT Devices—Experiences and Recommendations,” Sensors 21, 6906, 2021.
J. King and A. I. Awad, “A Distributed Security Mechanism for Resource-Constrained IoT Devices,” Informatica 40, pp. 133-143, 2016.
A-EM Taha, A. M. Rashwan, and H. S. Hassanein, “Secure Communications for Resource-Constrained IoT Devices,” Sensors 20, no. 13: 3637, 2020.
A. Nagesh and A. Gopi, “Secure Communication in Internet of Things,” International Journal of Wireless Networks and Communications, 9(1), pp.13-20, 2017.
G.E.P Kumar, M. Lydia, and Y. Levron, “Security Challenges in 5G and IoT Networks: A Review,” In: S. Velliangiri, M. Gunasekaran, P. Karthikeyan (eds) Secure Communication for 5G and IoT Networks, Springer, Cham, pp.1-13, 2022.
A. Feijoo-Añazco, D. Garcia-Carrillo, J. Sanchez-Gomez, and R. Marin-Perez, “Innovative security and compression for constrained IoT networks,” Internet of Things, vol. 24, 2023.
J. Sun, F. Khan, J. Li, M. D. Alshehri, R. Alturki and M. Wedyan, "Mutual Authentication Scheme for the Device-to-Server Communication in the Internet of Medical Things," in IEEE Internet of Things Journal, vol. 8, no. 21, pp. 15663-15671, 2021.
K. T. Nguyen, M. Laurent, and N. Oualha, “Survey on secure communication protocols for the Internet of Things,” Ad Hoc Networks, vol. 32, pp. 17-31, 2015.
V. O. Nyangaresi, A. J. Rodrigues, and A. A. Al Rababah, “Secure Protocol for Resource-Constrained IoT Device Authentication,” International Journal of Interdisciplinary Telecommunications and Networking (IJITN) 14, no.1, pp. 1-15, 2022.
S. Sridhar and S. Smys, “Intelligent security framework for iot devices cryptography based end-to-end security architecture,” International Conference on Inventive Systems and Control (ICISC), Coimbatore, India, pp. 1-5, 2017.
S. Sasirekha, S. Swamynathan, and S. Suganya, “An ECC-Based Algorithm to Handle Secure Communication Between Heterogeneous IoT Devices,” In: A. Kalam, S. Das, K. Sharma (eds) Advances in Electronics, Communication and Computing, Lecture Notes in Electrical Engineering, vol 443, Springer, Singapore, 2018.
S. Babar, P. Mahalle, A. Stango, N. Prasad, and R. Prasad, “Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT),” In: N. Meghanathan, S. Boumerdassi, N. Chaki, D. Nagamalai, (eds) Recent Trends Netw. Secur. Appl., vol. 89, Springer, Berlin, Heidelberg, pp. 420-429, 2010.
J. Choi et al., “Secure IoT framework and 2D architecture for End-To-End security,” J. Supercomput 74, pp. 3521–3535, 2018.
J. Kim, Y. Jeon, and H. Kim, “The intelligent IoT common service platform architecture and service implementation,” J. Supercomput 74, pp. 4242–4260, 2018.
J.R. Arunkumar, S. Velmurugan, B. Chinnaiah, G. Charulatha, M.R. Prabhu, and A.P. Chakkaravarthy, "Logistic Regression with Elliptical Curve Cryptography to Establish Secure IoT," Comput. Syst. Sci. Eng., vol. 45, no. 3, pp. 2635-2645, 2023.
S. Li, H. Song, and M. Iqbal, “Privacy and Security for Resource-Constrained IoT Devices and Networks: Research Challenges and Opportunities,” Sensors, 19(8):1935, 2019.
R. Yugha and S. Chithra, “A survey on technologies and security protocols: Reference for future generation IoT,” Journal of Network and Computer Applications, vol.169, 2020.
J. Tournier, F. Lesueur, F. L. Mouël, L. Guyon, and H. Ben-Hassine, “A survey of IoT protocols and their security issues through the lens of a generic IoT stack,” Internet of Things, vol. 16, 2021.
M. Dworkin et al., “Advanced Encryption Standard (AES),” Federal Inf. Process. Stds. (NIST FIPS), National Institute of Standards and Technology, Gaithersburg, MD, 2001.
H. Kadry, A. Farouk, E. A. Zanaty, and O. Reyad, “Intrusion detection model using optimized quantum neural network and elliptical curve cryptography for data security,” Alexandria Engineering Journal, vol. 71, pp. 491-500, 2023.
K.T.M. Tran et al., “Analysis and Performance Comparison of IoT Message Transfer Protocols Applying in Real Photovoltaic System,” Int. J. Netw. Distrib. Comput., 2024.
S. -M. Kim, H. -S. Choi and W. -S. Rhee, “IoT home gateway for auto-configuration and management of MQTT devices,” IEEE Conference on Wireless Sensors (ICWiSe), Melaka, Malaysia, 2015, pp. 12-17.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.