Secure Communication Model for Constrained Internet of Things Devices

Authors

  • Omar Reyad

Keywords:

Security, Communications, Internet of Things, Symmetric cryptosystem, Asymmetric cryptosystem

Abstract

Internet of Things (IoT) devices are rapidly on the way to becoming a necessary component of our daily life. These tools are efficient at accomplishing a particular task because of their specialized abilities. The IoT platform involves a variety of devices, from less resource-constrained to wireless sensors. These devices are vulnerable to network and hardware/software assaults. Securing communication with constrained IoT devices is crucial to maintaining the privacy of user sensitive information. This study suggested an approach for data protection and secure connectivity that can be deployed as an IoT security system. A symmetric approach is used to encrypt plaintext data devices before storing, and an asymmetric cryptosystem is used for protecting the cloud services and IoT service gateway. The encrypted data can be stored/retrieved based on cloud service requests. Also, plain-text data appears on the client interface whenever needed. Performance measurement of Message Queue Telemetry Transport (MQTT) and Hyper Text Transfer Protocol (HTTP) are illustrated. The outcomes indicate the way the framework works to reduce security threats and guarantee the integrity of the presented IoT model.

Downloads

Download data is not yet available.

References

A. Gerodimos, L. Maglaras, M. A. Ferrag, N. Ayres, and I. Kantzavelou, “IoT: Communication protocols and security threats,” Internet of Things and Cyber-Physical Systems, vol. 3, pp.1-13, 2023.

S. Bhattacharjya and H. Saiedian, “A Novel Simplified Framework to Secure IoT Communications,” In Proceedings of the 7th International Conference on Information Systems Security and Privacy (ICISSP), pp. 399-406, 2021.

M. Goworko and J. Wytrebowicz, “A Secure Communication System for Constrained IoT Devices—Experiences and Recommendations,” Sensors 21, 6906, 2021.

J. King and A. I. Awad, “A Distributed Security Mechanism for Resource-Constrained IoT Devices,” Informatica 40, pp. 133-143, 2016.

A-EM Taha, A. M. Rashwan, and H. S. Hassanein, “Secure Communications for Resource-Constrained IoT Devices,” Sensors 20, no. 13: 3637, 2020.

A. Nagesh and A. Gopi, “Secure Communication in Internet of Things,” International Journal of Wireless Networks and Communications, 9(1), pp.13-20, 2017.

G.E.P Kumar, M. Lydia, and Y. Levron, “Security Challenges in 5G and IoT Networks: A Review,” In: S. Velliangiri, M. Gunasekaran, P. Karthikeyan (eds) Secure Communication for 5G and IoT Networks, Springer, Cham, pp.1-13, 2022.

A. Feijoo-Añazco, D. Garcia-Carrillo, J. Sanchez-Gomez, and R. Marin-Perez, “Innovative security and compression for constrained IoT networks,” Internet of Things, vol. 24, 2023.

J. Sun, F. Khan, J. Li, M. D. Alshehri, R. Alturki and M. Wedyan, "Mutual Authentication Scheme for the Device-to-Server Communication in the Internet of Medical Things," in IEEE Internet of Things Journal, vol. 8, no. 21, pp. 15663-15671, 2021.

K. T. Nguyen, M. Laurent, and N. Oualha, “Survey on secure communication protocols for the Internet of Things,” Ad Hoc Networks, vol. 32, pp. 17-31, 2015.

V. O. Nyangaresi, A. J. Rodrigues, and A. A. Al Rababah, “Secure Protocol for Resource-Constrained IoT Device Authentication,” International Journal of Interdisciplinary Telecommunications and Networking (IJITN) 14, no.1, pp. 1-15, 2022.

S. Sridhar and S. Smys, “Intelligent security framework for iot devices cryptography based end-to-end security architecture,” International Conference on Inventive Systems and Control (ICISC), Coimbatore, India, pp. 1-5, 2017.

S. Sasirekha, S. Swamynathan, and S. Suganya, “An ECC-Based Algorithm to Handle Secure Communication Between Heterogeneous IoT Devices,” In: A. Kalam, S. Das, K. Sharma (eds) Advances in Electronics, Communication and Computing, Lecture Notes in Electrical Engineering, vol 443, Springer, Singapore, 2018.

S. Babar, P. Mahalle, A. Stango, N. Prasad, and R. Prasad, “Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT),” In: N. Meghanathan, S. Boumerdassi, N. Chaki, D. Nagamalai, (eds) Recent Trends Netw. Secur. Appl., vol. 89, Springer, Berlin, Heidelberg, pp. 420-429, 2010.

J. Choi et al., “Secure IoT framework and 2D architecture for End-To-End security,” J. Supercomput 74, pp. 3521–3535, 2018.

J. Kim, Y. Jeon, and H. Kim, “The intelligent IoT common service platform architecture and service implementation,” J. Supercomput 74, pp. 4242–4260, 2018.

J.R. Arunkumar, S. Velmurugan, B. Chinnaiah, G. Charulatha, M.R. Prabhu, and A.P. Chakkaravarthy, "Logistic Regression with Elliptical Curve Cryptography to Establish Secure IoT," Comput. Syst. Sci. Eng., vol. 45, no. 3, pp. 2635-2645, 2023.

S. Li, H. Song, and M. Iqbal, “Privacy and Security for Resource-Constrained IoT Devices and Networks: Research Challenges and Opportunities,” Sensors, 19(8):1935, 2019.

R. Yugha and S. Chithra, “A survey on technologies and security protocols: Reference for future generation IoT,” Journal of Network and Computer Applications, vol.169, 2020.

J. Tournier, F. Lesueur, F. L. Mouël, L. Guyon, and H. Ben-Hassine, “A survey of IoT protocols and their security issues through the lens of a generic IoT stack,” Internet of Things, vol. 16, 2021.

M. Dworkin et al., “Advanced Encryption Standard (AES),” Federal Inf. Process. Stds. (NIST FIPS), National Institute of Standards and Technology, Gaithersburg, MD, 2001.

H. Kadry, A. Farouk, E. A. Zanaty, and O. Reyad, “Intrusion detection model using optimized quantum neural network and elliptical curve cryptography for data security,” Alexandria Engineering Journal, vol. 71, pp. 491-500, 2023.

K.T.M. Tran et al., “Analysis and Performance Comparison of IoT Message Transfer Protocols Applying in Real Photovoltaic System,” Int. J. Netw. Distrib. Comput., 2024.

S. -M. Kim, H. -S. Choi and W. -S. Rhee, “IoT home gateway for auto-configuration and management of MQTT devices,” IEEE Conference on Wireless Sensors (ICWiSe), Melaka, Malaysia, 2015, pp. 12-17.

Downloads

Published

05.06.2024

How to Cite

Omar Reyad. (2024). Secure Communication Model for Constrained Internet of Things Devices. International Journal of Intelligent Systems and Applications in Engineering, 12(3), 4293–4299. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/6144

Issue

Section

Research Article