A Distributed Security Protocol Designed for the Context of Internet of Things

被引:0
|
作者
Laouid, Abdelkader [1 ]
AlShaikh, Muath [2 ]
Lalem, Farid [2 ]
Bounceur, Ahcene [2 ]
Euler, Reinhardt [2 ]
Bezoui, Madani [3 ]
Aissaoua, Habib [4 ]
Tari, Abdelkamel [5 ]
机构
[1] Univ El Oued, El Oued, Algeria
[2] Univ Western Brittany UBO, Lab STICC, UMR CNRS 6285, Brest, France
[3] Univ Boumerdes, Dept Math, Boumerdes, Algeria
[4] Univ Setif, Dept Comp Sci, Setif, Algeria
[5] Univ Bejaia, Bejaia, Algeria
关键词
IoT; Distributed algorithms; Security; SCHEME;
D O I
10.1145/3231053.3231079
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the field of Internet of Things (IoT), many encryption protocols for distributed wireless communication technology have been proposed for use in various applications such as monitoring, healthcare, product management, workplace, home support and surveillance [1]. An IoT system can be looked at as a highly dynamic distributed and networked system composed of a large number of smart devices. In fact, such connected devices suffer from the limitation of resources in terms of computing, energy, bandwidth and storage. Hence, IoT application scenarios require methods to adapt to highly diverse contexts with different available resources and possibly dynamic environments. In this paper, we address these issues by proposing an efficient technique for data protection in the context of IoT. A distributed network architecture is used, where each node is in charge to deliver and/or forward data. The aim is to use efficient operations to protect the exchanged data. The proposed technique ensures the exchanged data to be effectively and securely controlled with a low overhead compared to the classical approaches. The proposed protocol shows its efficiency in terms of overhead, speed, energy and security measurements.
引用
下载
收藏
页数:5
相关论文
共 50 条
  • [1] Protocol Security in the Industrial Internet of Things
    Dahlmanns, Markus
    Wehrle, Klaus
    PROCEEDINGS OF 2024 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, NOMS 2024, 2024,
  • [2] Security for the Internet of Things and the Bluetooth Protocol
    Fagua Arevalo, Rodrigo Alexander
    Salcedo Parra, Octavio Jose
    Sanchez Cespedes, Juan Manuel
    FUTURE DATA AND SECURITY ENGINEERING, FDSE 2018, 2018, 11251 : 74 - 79
  • [3] Internet of Things: A Survey on Communication Protocol Security
    Santo, Walter E.
    Salgueiro, Ricardo J. P. de B.
    Santos, Reneilson
    Souza, Danilo
    Ribeiro, Admilson
    Moreno, Edward
    PROCEEDINGS OF THE EURO AMERICAN CONFERENCE ON TELEMATICS AND INFORMATION SYSTEMS (EATIS '18), 2018,
  • [4] Evaluating Security of MQTT Protocol in Internet of Things
    Al-Ani, Ayman
    Shen, Wong Kang
    Al-Ani, Ahmed K.
    Laghari, Shams A.
    Elejla, Omar E.
    2023 IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, CCECE, 2023,
  • [5] Cyberphysical Security for the Masses A Survey of the Internet Protocol Suite for Internet of Things Security
    Tschofenig, Hannes
    Baccelli, Emmanuel
    IEEE SECURITY & PRIVACY, 2019, 17 (05) : 47 - 57
  • [6] A Security Routing Protocol for Internet of Things Based on RPL
    Ma, Guojun
    Li, Xing
    Pei, Qingqi
    Li, Zi
    2017 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA), 2017, : 209 - 213
  • [7] ENERGY EFFICIENT SECURITY PROTOCOL FOR HEALTHCARE INTERNET OF THINGS
    Babu, Ravi Mahesh
    Malluvalasa, S.N. Lakshmi
    Devi, M. Kalpana
    Karthik, Sagirala Satya
    Rakesh, M.
    Prasad, Satamraju Krishna
    Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika), 2024, 83 (12): : 65 - 78
  • [8] Security algorithm of Internet of Things based on ZigBee protocol
    Wang, Yongkang
    Chen, Chunxia
    Jiang, Qijie
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 6): : 14759 - 14766
  • [9] Security algorithm of Internet of Things based on ZigBee protocol
    Yongkang Wang
    Chunxia Chen
    Qijie Jiang
    Cluster Computing, 2019, 22 : 14759 - 14766
  • [10] Security Analysis of the Constrained Application Protocol in the Internet of Things
    Alghamdi, Thamer A.
    Lasebae, Aboubaker
    Aiash, Mahdi
    2013 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION TECHNOLOGY (FGCT 2013), 2013, : 163 - 168