IoT-Cloud collaboration to establish a secure connection for lightweight devices

被引:17
|
作者
Park, Jiye [1 ]
Kwon, Hyeokjin [2 ]
Kang, Namhi [2 ]
机构
[1] Univ Duisburg Essen, Comp Networking Technol Grp, Ellernstr 29, D-45326 Essen, Germany
[2] Duksung Womens Univ, Digital Media Dept, Samyang Ro 144 Gil, Seoul 01369, South Korea
基金
新加坡国家研究基金会;
关键词
Internet of Things; Security; DTLS; CloudIoT; collaboration; Handshake delegator; Performance evaluation; INTERNET;
D O I
10.1007/s11276-015-1182-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) technologies allow everyday objects including small devices in sensor networks to be capable of connecting to the Internet. Such an innovative technology can lead to positive changes in human life. However, if there is no proper security mechanism, private and sensitive data around humans can be revealed to the public Internet. In this aspect, this paper considers security issues of the IoT. In particular, we focus on various challenges in deploying Datagram Transport Layer Security (DTLS) protocol into a resource constrained environment. DTLS provides secure communication with UDP-based applications the same as TLS does for TCP-based applications. Several standard organizations such as IETF, oneM2M and OMA recommend using the DTLS as a default secure scheme for CoAP which is a new standard specified for resource-constrained environments. To find a practical way to deploy the DTLS in such a constrained IoT environments, we propose an IoT-Cloud collaboration system, where DTLS handshake delegation is themain component. We also implement and evaluate the proposed systemin our real IoT testbed, where constrained devices are interconnected with each other in a multi-hop fashion. Evaluation results show that the proposed scheme dramatically reduces DTLS handshake latency, implementation code size and energy consumption.
引用
收藏
页码:681 / 692
页数:12
相关论文
共 50 条
  • [1] IoT–Cloud collaboration to establish a secure connection for lightweight devices
    Jiye Park
    Hyeokjin Kwon
    Namhi Kang
    [J]. Wireless Networks, 2017, 23 : 681 - 692
  • [2] Secure Biometric Image Retrieval in IoT-Cloud
    Abduljabbar, Zaid Ameen
    Jin, Hai
    Ibrahim, Ayad
    Hussien, Zaid Alaa
    Hussain, Mohammed Abdulridha
    Abbdal, Salah H.
    Zou, Deqing
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATIONS AND COMPUTING (ICSPCC), 2016,
  • [3] Secure Lightweight Data Communication Between the IoT Devices and Cloud Service
    Phuong, Tran Viet Xuan
    Tho Thi Ngoc Le
    Huy Le Ngoc
    [J]. ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, AINA 2024, 2024, 200 : 404 - 415
  • [4] Secure Connection Assistance Architecture for IoT Devices
    Mori, Mika
    Sueda, Yoshiko
    Aihara, Masao
    [J]. 2016 22ND IEEE INTERNATIONAL SYMPOSIUM ON LOCAL AND METROPOLITAN AREA NETWORKS (IEEE LANMAN), 2016,
  • [5] Lightweight Secure Message Delivery for E2E S2S Communication in the IoT-Cloud System
    Al Sibahee, Mustafa A.
    Lu, Songfeng
    Abduljabbar, Zaid Ameen
    Liu, Xin
    Abdalla, Hemn Barzan
    Hussain, Mohammed Abdulridha
    Hussien, Zaid Alaa
    Ghrabat, Mudhafar Jalil Jassim
    [J]. IEEE Access, 2020, 8 : 218331 - 218347
  • [6] Lightweight Secure Message Delivery for E2E S2S Communication in the IoT-Cloud System
    Al Sibahee, Mustafa A.
    Lu, Songfeng
    Abduljabbar, Zaid Ameen
    Liu, Xin
    Abdalla, Hemn Barzan
    Hussain, Mohammed Abdulridha
    Hussien, Zaid Alaa
    Jassim Ghrabat, Mudhafar Jalil
    [J]. IEEE ACCESS, 2020, 8 : 218331 - 218347
  • [7] A Secure Mutual Authentication Protocol Based on Visual Cryptography Technique for IoT-Cloud
    Ehuil, Brou Bernard
    Chen, Chen
    Wang, Shirui
    Guo, Hua
    Liu, Jianwei
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2024, 33 (01) : 43 - 57
  • [8] A Secure Mutual Authentication Protocol Based on Visual Cryptography Technique for IoT-Cloud
    Brou Bernard Ehui
    Chen CHEN
    Shirui WANG
    Hua GUO
    Jianwei LIU
    [J]. Chinese Journal of Electronics, 2024, 33 (01) : 43 - 57
  • [9] Optimal Fuzzy Logic Enabled Intrusion Detection for Secure IoT-Cloud Environment
    Alrayes, Fatma S.
    Alshuqayran, Nuha
    Nour, Mohamed K.
    Al Duhayyim, Mesfer
    Mohamed, Abdullah
    Mohammed, Amgad Atta Abdelmageed
    Mohammed, Gouse Pasha
    Yaseen, Ishfaq
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (03): : 6737 - 6753
  • [10] Lightweight Authentication and Secure Communication Suitable for IoT Devices
    Buchovecka, Simona
    Lorencz, Robert
    Bucek, Jiri
    Kodytek, Filip
    [J]. ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 75 - 83