End to End Secure Anonymous Communication for Secure Directed Diffusion in IoT

被引:10
|
作者
Sengupta, Jayasree [1 ]
Ruj, Sushmita [2 ]
Das Bit, Sipra [1 ]
机构
[1] Indian Inst Engn Sci & Technol, Howrah, India
[2] Indian Stat Inst, Kolkata, India
关键词
IoT; pairing; pseudonym; Secure Directed Diffusion (SDD); anonymous communication; end to end data secrecy; node privacy; impersonation;
D O I
10.1145/3288599.3295577
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) paradigm integrates smart devices and sensors to build systems such as smart homes, healthcare etc. However, sensors are prone to several attacks from malicious insiders as well as outsiders. Thus to secure IoT based applications, providing anonymous communication and end to end data secrecy while preventing impersonation and preserving privacy of nodes are important concerns. The existing solutions on achieving anonymous communication or data secrecy, either cannot achieve complete anonymity or have large storage or communication overhead which is difficult to implement in resource-constrained sensor based IoT. So, in this work we propose an Improved Secure Directed Diffusion (ISDD) protocol targeting a low-overhead solution for all the said security goals. The ISDD uses pseudonyms to conceal the node's real identity thereby ensuring anonymous communication. It also uses bilinear pairing to derive shared keys which are then used to generate multiple encryption layers over the plaintext message. Thus ISDD achieves end to end data secrecy, privacy of nodes and also effectively prevents malicious adversaries from impersonating a legitimate node. Finally, through security analysis we establish the aforementioned claims while achieving additional features compared to other state-of-the-art competing schemes. We also compute different overheads which are compared with two existing schemes. Results show significant improvement of ISDD in communication and storage overhead over both the competing schemes at the cost of marginal higher computation while keeping energy consumption within an acceptable limit.
引用
收藏
页码:445 / 450
页数:6
相关论文
共 50 条
  • [1] A secure end-to-end IoT solution
    Mathur, Avijit
    Newe, Thomas
    Elgenaidi, Walid
    Rao, Muzaffar
    Dooly, Gerard
    Toal, Daniel
    [J]. SENSORS AND ACTUATORS A-PHYSICAL, 2017, 263 : 291 - 299
  • [2] Multi-Layered IoT System Design Towards End-to-End Secure Communication
    Rech, Alexander
    Gressl, Lukas
    Basic, Fikret
    Seifert, Christian
    Steger, Christian
    Sinnhofer, Andreas
    [J]. IECON 2020: THE 46TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2020, : 2213 - 2220
  • [3] End to End Autorship Email Verification Framework for a Secure Communication
    Giorgi, Giacomo
    Saracino, Andrea
    Martinelli, Fabio
    [J]. INFORMATION SYSTEMS SECURITY AND PRIVACY, ICISSP 2020, 2022, 1545 : 73 - 96
  • [4] End-to-end secure group communication for the Internet of Things
    Lizardo, Andre
    Barbosa, Raul
    Neves, Samuel
    Correia, Jaime
    Araujo, Filipe
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [5] Secure End-to-End Communication for Constrained Devices in IoT-enabled Ambient Assisted Living Systems
    Porambage, Pawani
    Braeken, An
    Gurtov, Andrei
    Ylianttila, Mika
    Spinsante, Susanna
    [J]. 2015 IEEE 2ND WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2015, : 711 - 714
  • [6] A Novel Secure End-to-End IoT Communication Scheme Using Lightweight Cryptography Based on Block Cipher
    Winarno, Agus
    Sari, Riri Fitri
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (17):
  • [7] SCIoT: A Secure and sCalable End-to-End Management Framework for IoT Devices
    Ambrosin, Moreno
    Conti, Mauro
    Ibrahim, Ahmad
    Sadeghi, Ahmad-Reza
    Schunter, Matthias
    [J]. COMPUTER SECURITY (ESORICS 2018), PT I, 2018, 11098 : 595 - 617
  • [8] STAC-Protocol: Secure and Trust Anonymous Communication Protocol for IoT
    Jebri, Sarra
    Abid, Mohamed
    Bouallegue, Ammar
    [J]. 2017 13TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2017, : 365 - 370
  • [9] Secure Provisioning for Achieving End-to-End Secure Communications
    Sousa, Patricia R.
    Resende, Joao S.
    Martins, Rolando
    Antunes, Luis
    [J]. AD-HOC, MOBILE, AND WIRELESS NETWORKS (ADHOC-NOW 2019), 2019, 11803 : 498 - 507
  • [10] Towards Flexible and Secure End-to-End Communication in Industry 4.0
    Maksuti, Silia
    Bicaku, Ani
    Tauber, Markus
    Palkovits-Rauter, Silke
    Haas, Sarah
    Delsing, Jerker
    [J]. 2017 IEEE 15TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2017, : 883 - 888