Security scheme for mobility management in the internet of things

被引:2
|
作者
Brian, Oryema [1 ]
Chun, Seung Man [2 ]
Jung, Cheol Woo [3 ]
Park, Jong Tae [3 ]
机构
[1] Kyungpook Natl Univ, KNU LG Elect Convergence Res Ctr, 80 Daehakro, Daegu 41566, South Korea
[2] Gyeongbuk Inst IT Convergence Ind Technol, Gyeongbuk 38463, South Korea
[3] Kyungpook Natl Univ, Sch Elect Engn, 80 Daehakro, Daegu 41566, South Korea
基金
新加坡国家研究基金会;
关键词
security in internet of things; secure mobility; secure binding; private key in IoT; PROTOCOLS; 6LOWPAN;
D O I
10.1504/IJAHUC.2018.10015703
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A mobility management protocol based on the constrained application protocol (CoAP), called the CoAP-based mobility management protocol (CoMP), was suggested to counteract the constraints of mobile internet protocol version 6 (MIPv6) in the Internet of Things (IoT) environment. CoMP exchanges Binding Update (BU) messages to manage location changes, but BU messages are subject to security vulnerabilities, such as denial of service (DoS), false BU, session hijacking, and man-in-the-middle (MITM) attacks. In this paper, we extend CoMP by proposing a security scheme based on a private key to protect the BU CoMP messages exchanged between the mobile nodes and clients, referred to as private key-based BU for CoMP (PKBU-CoMP). PKBU-CoMP ensures that mobile nodes check and confirm the address ownership and validity of mobile nodes before performing any BU operation. The performance of PKBU-CoMP is analysed both mathematically and using Cooja simulations.
引用
收藏
页码:116 / 128
页数:13
相关论文
共 50 条
  • [1] End-to-end security scheme for mobility enabled healthcare Internet of Things
    Moosavi, Sanaz Rahimi
    Tuan Nguyen Gia
    Nigussie, Ethiopia
    Rahmani, Amir M.
    Virtanen, Seppo
    Tenhunen, Hannu
    Isoaho, Jouni
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 64 : 108 - 124
  • [2] Lightweight Security Scheme for Internet of Things
    Aziz, Ahmed
    Singh, Karan
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2019, 104 (02) : 577 - 593
  • [3] Lightweight Security Scheme for Internet of Things
    Ahmed Aziz
    Karan Singh
    [J]. Wireless Personal Communications, 2019, 104 : 577 - 593
  • [4] Secure and scalable mobility management scheme for the Internet of Things integration in the future internet architecture
    Jara, Antonio J.
    Kafle, Ved P.
    Skarmeta, Antonio F.
    [J]. INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2013, 13 (3-4) : 228 - 242
  • [5] A Participatory Verification Security Scheme for the Internet of Things
    Chifor, Bogdan-Cosmin
    Bica, Ion
    Patriciu, Victor-Valeriu
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM 2016), 2016, : 267 - 270
  • [6] Security Authentication Scheme for Power Internet of Things
    Dang, Fang Fang
    Li, Shuai
    Yan, Li Jing
    Li, Ding Ding
    [J]. 2022 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN 2022), 2022, : 94 - 97
  • [7] A Note on Security Management of the Internet of Things
    Chen, Long
    Erfani, Shervin
    [J]. 2017 IEEE 30TH CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2017,
  • [8] Fog-Based Internet of Things: A Security Scheme
    Alhazmi, Omar H.
    Aloufi, Khalid S.
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [9] AN IBE-BASED SECURITY SCHEME ON INTERNET OF THINGS
    Chen, Wang
    [J]. 2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 1046 - 1049
  • [10] Survey: Security and Trust Management in Internet of Things
    Thirukkumaran, R.
    Kannan, Muthu P.
    [J]. 2018 2ND IEEE GLOBAL CONFERENCE ON WIRELESS COMPUTING AND NETWORKING (GCWCN - 2018), VOL II, 2018, : 131 - 134