A Secured Protocol for IoT Devices in Tactical Networks

被引:0
|
作者
Wang, Wei [1 ]
Chi, Zicheng [2 ]
Liu, Xin [4 ]
Bhaskar, Ananth Vishnu [3 ]
Baingane, Ankit [3 ]
Jahnige, Ryan [3 ]
Zhang, Qingquan [3 ]
Zhu, Ting [4 ]
机构
[1] St Louis Univ, St Louis, MO 63103 USA
[2] Cleveland State Univ, Cleveland, OH 44115 USA
[3] Univ Maryland Baltimore Cty, Baltimore, MD 21228 USA
[4] Ohio State Univ, Columbus, OH 43210 USA
来源
2022 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM) | 2022年
关键词
Wireless Sensor Networks; security; individual sensors; Symmetric Key cryptography; Alternate Paths;
D O I
10.1109/MILCOM55135.2022.10017581
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, Internet-of-Things (IoT) have shown great potential to improve the performance of different applications. However, the advances of IoT also make the security issue become one of the biggest challenges for these applications. Researchers in the past have shown that Symmetric key cryptography is generally considered infeasible and public key cryptography, at times, fails to provide sufficient security and integrity to data. In contrast to this prejudice, our paper presents a novel approach that establishes security to data through encryption techniques like RSA. Moreover, it identifies the shortest path to route messages from the source to the destination and ensures that packets are delivered safely even when intermediate nodes are attacked by identifying Alternate paths between the source and the destination. We implement and evaluate our design by using J2ME, and the evaluation results show the effectiveness of our design.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] High performance FPGA based secured hardware model for IoT devices
    Shrivastava, Anurag
    Haripriya, D.
    Borole, Yogini Dilip
    Nanoty, Archana
    Singh, Charanjeet
    Chauhan, Divyansh
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2022, 13 (SUPPL 1) : 736 - 741
  • [22] A Framework for Efficient and Secured Mobility of IoT Devices in Mobile Edge Computing
    Almajali, Sufyan
    Salameh, Haythem Bany
    Ayyash, Moussa
    Elgala, Hany
    2018 THIRD INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), 2018, : 58 - 62
  • [23] SECURED BACKUP ROUTING PROTOCOL FOR AD HOC NETWORKS
    Lavanya, G.
    Kumar, C.
    Arokiaraj, A. Rex Macedo
    2010 INTERNATIONAL CONFERENCE ON SIGNAL ACQUISITION AND PROCESSING: ICSAP 2010, PROCEEDINGS, 2010, : 45 - 50
  • [24] Secured PARTY protocol for self-organized networks
    Khatib, Mounis
    Al-Sukkar, Ghazi
    Sabeur, Mehdi
    Mhamed, Abdallah
    Mokhtari, Mounir
    2007 IFIP INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS, 2007, : 333 - 337
  • [25] Secured communication protocol for internetworking ZigBee cluster networks
    Kim, Hyunjue
    Chung, Jong-Moon
    Kim, Chang Hyun
    COMPUTER COMMUNICATIONS, 2009, 32 (13-14) : 1531 - 1540
  • [26] Proposed Protocol for Secured Routing in Ad hoc Networks
    Kush, Ashwani
    Hwang, C. Jinshong
    IACSIT-SC 2009: INTERNATIONAL ASSOCIATION OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY - SPRING CONFERENCE, 2009, : 76 - 81
  • [27] SPRP: a secured routing protocol for delay tolerant networks
    Swati
    Sivia, Jagtar Singh
    Bindra, Harminder Singh
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2019, 31 (03) : 156 - 171
  • [28] SPRP: A secured routing protocol for delay tolerant networks
    Swati
    Sivia J.S.
    Bindra H.S.
    International Journal of Sensor Networks, 2019, 31 (03): : 156 - 171
  • [29] Evaluating LoRaWAN-based IoT Devices for the Tactical Military Environment
    Jalaian, Brian
    Gregory, Timothy
    Suri, Niranjan
    Russell, Stephen
    Sadler, Laurel
    Lee, Michael
    2018 IEEE 4TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2018, : 124 - 128
  • [30] Optimized and Secured AI for the Tactical Edge
    Chai, Sek
    Ostrowski, Scott
    ASSURANCE AND SECURITY FOR AI-ENABLED SYSTEMS, 2024, 13054