SINGLETON: A lightweight and secure end-to-end encryption protocol for the sensor networks in the Internet of Things based on cryptographic ratchets

被引:4
|
作者
Karbasi, Amir Hassani [1 ]
Shahpasand, Siyamak [2 ]
机构
[1] Khazar Univ, Dept Comp Sci, Baku, Azerbaijan
[2] Univ Tabriz, Dept Comp Engn, Tabriz, Iran
来源
JOURNAL OF SUPERCOMPUTING | 2021年 / 77卷 / 04期
关键词
Double Ratchet algorithm; Lightweight end-to-end encryption; Cryptographic key distribution; Sensor networks; IoT; Cybersecurity;
D O I
10.1007/s11227-020-03411-x
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
For many systems, safe connectivity is an important requirement, even if the transmitting machines are resource-constrained. The advent of the Internet of Things (IoT) has also increased the demand for low-power devices capable of connecting with each other or sending data to a central processing site. The IoT allows many applications in a smart environment, such as outdoor activity control, smart energy, infrastructure management, environmental sensing, or cyber-security issues. Security in such situations remains an open challenge because of the resource-constrained design of sensors and objects, or the multi-purpose adversaries may target the process during the life cycle of a smart sensor. This paper discusses widely used protocols that provide safe communications for various applications in IoT and also different attacks are defined. In this paper, to protect the IoT objects and sensors, we propose a comprehensive and lightweight security protocol based on Cryptographic Ratchets. That is, an encrypted messaging protocol using the Double Ratchet Algorithm is defined which we call Singleton, and the implementation of protocol is tested and compared to the implementation of the IoT standard protocols and a post-quantum version of the protocol. Various cryptographic primitives are also evaluated, and their suitability for use in the protocol is tested. The results show that the protocol as the building stone not only enables efficient resource-wise protocols and architectures but also provides advanced and scalable IoT sensors. Our design and analysis demonstrate that Singleton security architecture can be easily integrated into existing network protocols such as IEEE 802.15.4 or OMA LWM2M, which offers several benefits that existing approaches cannot offer both performance and important security services. For chat applications such as WhatsApp, Skype, Facebook Private Messenger, Google Allo, and Signal, a cryptographic ratchet-based protocol provides end-to-end encryption, forward secrecy, backward secrecy, authentication, and deniability.
引用
收藏
页码:3516 / 3554
页数:39
相关论文
共 50 条
  • [21] End-to-end protocol to secure ad hoc networks against wormhole attacks
    Khurana, Sandhya
    Gupta, Neelima
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (09) : 994 - 1002
  • [22] A secure end-to-end SMS-based mobile banking protocol
    Bojjagani, Sriramulu
    Sastry, V. N.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (15)
  • [23] Secure End-to-End Data Aggregation (SEEDA) Protocols for Wireless Sensor Networks
    Poornima, A. S.
    Amberker, B. B.
    AD HOC & SENSOR WIRELESS NETWORKS, 2013, 17 (3-4) : 193 - 219
  • [24] Functional networks based Internet end-to-end delay dynamics
    Zhu, CH
    Pei, CX
    Li, HD
    18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 540 - 543
  • [25] RAARPL: End-to-end Reliability-Aware Adaptive RPL routing protocol for Internet of things
    Shahbakhsh, Parisa
    Ghafouri, Sayyed Hamid
    Bardsiri, Amid Khatibi
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2023, 36 (06)
  • [26] Minimizing End-to-End Delay Routing Protocol for Rechargeable Wireless Sensor Networks
    Gao, Demin
    Lin, Haifeng
    Liu, Yunfei
    Jiang, Anna
    AD HOC & SENSOR WIRELESS NETWORKS, 2016, 34 (1-4) : 77 - 98
  • [27] A secure end-to-end proximity NFC-based mobile payment protocol
    Bojjagani, Sriramulu
    Sastry, V. N.
    COMPUTER STANDARDS & INTERFACES, 2019, 66
  • [28] Enabling End-to-End Communication Between Wireless Sensor Networks and the Internet Based on 6LoWPAN
    Luo Bingqing
    Sun Zhixin
    CHINESE JOURNAL OF ELECTRONICS, 2015, 24 (03) : 633 - 638
  • [29] An Average Velocity-Based Routing Protocol with Low End-to-End Delay for Wireless Sensor Networks
    Choi, Sung-Chan
    Gong, Seong-Lyong
    Lee, Jang-Won
    IEEE COMMUNICATIONS LETTERS, 2009, 13 (08) : 621 - 623
  • [30] Session Resumption-Based End-to-End Security for Healthcare Internet-of-Things
    Moosavi, Sanaz Rahimi
    Tuan Nguyen Gia
    Nigussie, Ethiopia
    Rahmani, Amir-Mohammad
    Virtanen, Seppo
    Tenhunen, Hannu
    Isoaho, Jouni
    CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 581 - 588