Reliable and secure data transfer in IoT networks

被引:20
|
作者
Gochhayat, Sarada Prasad [1 ]
Lal, Chhagan [2 ]
Sharma, Lokesh [3 ]
Sharma, D. P. [3 ]
Gupta, Deepak [4 ]
Saucedo, Jose Antonio Marmolejo [5 ]
Kose, Utku [6 ]
机构
[1] Old Dominion Univ, Virginia Modeling Anal & Simulat Ctr, Norfolk, VA USA
[2] Univ Padua, Dept Math, Padua, Italy
[3] Manipal Univ Jaipur, Dept IT, Jaipur, Rajasthan, India
[4] Maharaja Agrasen Inst Technol, Delhi, India
[5] Univ Panamer, Mexico City, DF, Mexico
[6] Suleyman Demirel Univ, Isparta, Turkey
关键词
Security; Internet of Things; Mobile agents; Resource exhaustion; Wireless networks; PRIVACY;
D O I
10.1007/s11276-019-02036-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid technological improvements in mobile devices and their inclusion in Internet of Things (IoT), secure key management becomes mandatory to ensure security of information exchange. For instance, IoT applications, such as smart health-care and smart homes, provide automated services to the users with less or no user intervention. As these application use user-sensitive data, ensuring their security and privacy should be paramount, especially during the key management process. However, traditional approaches for key management will not suit well in IoT environment because of the inherent resource constraint property of IoT devices. In this paper, we propose a novel distributed key management scheme for IoT ecosystem. The proposed scheme efficiently provides security to IoT devices by delegating most of the resource consuming cryptographic processing to a local entity. This entity coordinates with other peer entities to provide a distributed key as well as an authentication mechanism to network devices. In particular, the proposed scheme exploits the advantages of mobile agents by deploying them in different subnetworks as and when required: (1) to process the cryptography work for the IoT devices, and (2) to act as an local authenticated entity to perform fast authentication process. To verify the effectiveness and correctness of our proposed scheme, we have simulated it in a large IoT scenario and evaluated against relevant metrics that includes user mobility, certification generation time, and communication overhead.
引用
收藏
页码:5689 / 5702
页数:14
相关论文
共 50 条
  • [1] Reliable and secure data transfer in IoT networks
    Sarada Prasad Gochhayat
    Chhagan Lal
    Lokesh Sharma
    D. P. Sharma
    Deepak Gupta
    Jose Antonio Marmolejo Saucedo
    Utku Kose
    [J]. Wireless Networks, 2020, 26 : 5689 - 5702
  • [2] A Fast, Secure, Reliable, and Resilient Data Transfer Framework for Pervasive IoT Applications
    Montella, Raffaele
    Ruggieri, Mario
    Kosta, Sokol
    [J]. IEEE INFOCOM 2018 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2018, : 710 - 715
  • [3] Secure and Reliable Data Transmission in SDN-based Backend Networks of Industrial IoT
    Li, Tao
    Hofmann, Christoph
    Franz, Elke
    [J]. PROCEEDINGS OF THE 2020 IEEE 45TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2020), 2020, : 365 - 368
  • [4] RCOAP: A Rate Control Scheme for Reliable Bursty Data Transfer in IoT Networks
    Dang Hai Hoang
    Thi Thuy Duong Le
    [J]. IEEE ACCESS, 2021, 9 : 169281 - 169298
  • [5] REMI: A Reliable and Secure Multicast Routing Protocol for IoT Networks
    Conti, Mauro
    Kaliyar, Pallavi
    Lal, Chhagan
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [6] STEM : Secure transfer of encrypted message in IoT networks
    Sonam
    Johari, Rahul
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (04): : 1425 - 1434
  • [7] Reliable resource allocation with RF fingerprinting authentication in secure IoT networks
    Weiwei WU
    Su HU
    Di LIN
    Gang WU
    [J]. Science China(Information Sciences), 2022, (07) : 51 - 66
  • [8] Reliable resource allocation with RF fingerprinting authentication in secure IoT networks
    Wu, Weiwei
    Hu, Su
    Lin, Di
    Wu, Gang
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2022, 65 (07)
  • [9] Reliable resource allocation with RF fingerprinting authentication in secure IoT networks
    Weiwei Wu
    Su Hu
    Di Lin
    Gang Wu
    [J]. Science China Information Sciences, 2022, 65
  • [10] IoT Enabled API for Secure Transfer of Medical Data
    Sonune, Suvarnamala
    Kalbande, Dhananjay
    [J]. PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL (I2C2), 2017,