End to End Secure Anonymous Communication for Secure Directed Diffusion in IoT

被引:10
|
作者
Sengupta, Jayasree [1 ]
Ruj, Sushmita [2 ]
Das Bit, Sipra [1 ]
机构
[1] Indian Inst Engn Sci & Technol, Howrah, India
[2] Indian Stat Inst, Kolkata, India
关键词
IoT; pairing; pseudonym; Secure Directed Diffusion (SDD); anonymous communication; end to end data secrecy; node privacy; impersonation;
D O I
10.1145/3288599.3295577
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) paradigm integrates smart devices and sensors to build systems such as smart homes, healthcare etc. However, sensors are prone to several attacks from malicious insiders as well as outsiders. Thus to secure IoT based applications, providing anonymous communication and end to end data secrecy while preventing impersonation and preserving privacy of nodes are important concerns. The existing solutions on achieving anonymous communication or data secrecy, either cannot achieve complete anonymity or have large storage or communication overhead which is difficult to implement in resource-constrained sensor based IoT. So, in this work we propose an Improved Secure Directed Diffusion (ISDD) protocol targeting a low-overhead solution for all the said security goals. The ISDD uses pseudonyms to conceal the node's real identity thereby ensuring anonymous communication. It also uses bilinear pairing to derive shared keys which are then used to generate multiple encryption layers over the plaintext message. Thus ISDD achieves end to end data secrecy, privacy of nodes and also effectively prevents malicious adversaries from impersonating a legitimate node. Finally, through security analysis we establish the aforementioned claims while achieving additional features compared to other state-of-the-art competing schemes. We also compute different overheads which are compared with two existing schemes. Results show significant improvement of ISDD in communication and storage overhead over both the competing schemes at the cost of marginal higher computation while keeping energy consumption within an acceptable limit.
引用
收藏
页码:445 / 450
页数:6
相关论文
共 50 条
  • [31] A More Secure and Revocable Anonymous Authentication Scheme for IoT
    Mao, Mana
    Yu, Jiujiu
    Wang, Yimin
    [J]. International Journal of Network Security, 2023, 25 (04): : 595 - 602
  • [32] Survey for Secure IoT group communication
    Park, Jiye
    Jung, Markus
    Rathgeb, Erwin P.
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2019, : 1026 - 1031
  • [33] A SECURE END COLOSTOMY TECHNIQUE
    LIGHT, HG
    [J]. SURGERY GYNECOLOGY & OBSTETRICS, 1992, 174 (01): : 67 - 68
  • [34] SecureSense: End-to-end secure communication architecture for the cloud-connected Internet of Things
    Raza, Shahid
    Helgason, Tomas
    Papadimitratos, Panos
    Voigt, Thiemo
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 77 : 40 - 51
  • [35] The sharing session key component (SSKC) algorithm for end-to-end secure wireless communication
    Wu, HK
    Yang, SC
    Lin, YT
    [J]. 34TH ANNUAL 2000 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2000, : 242 - 250
  • [36] Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication
    Wu, Banghua
    Nazir, Shah
    Mukhtar, Neelam
    [J]. COMPLEXITY, 2020, 2020
  • [37] Effective Model for Real Time End to End Secure Communication Over GSM Voice Channel
    Rehman, Mobeen Ur
    Adnan, Muhammad
    Batool, Mouazma
    Khan, Liaqat Ali
    Masood, Ammar
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 119 (02) : 1643 - 1659
  • [38] SECURE COMMUNICATION IN INTERNET ENVIRONMENTS - A HIERARCHICAL KEY MANAGEMENT SCHEME FOR END-TO-END ENCRYPTION
    LU, WP
    SUNDARESHAN, MK
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 1989, 37 (10) : 1014 - 1023
  • [39] Effective Model for Real Time End to End Secure Communication Over GSM Voice Channel
    Mobeen Ur Rehman
    Muhammad Adnan
    Mouazma Batool
    Liaqat Ali Khan
    Ammar Masood
    [J]. Wireless Personal Communications, 2021, 119 : 1643 - 1659
  • [40] End-to-end authentication based secure communication in vehicular ad hoc networks (VANET)
    Kumar, Ankit
    Sharma, Neeraj
    Kumar, Abhishek
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (01): : 219 - 229