SINGLETON: A lightweight and secure end-to-end encryption protocol for the sensor networks in the Internet of Things based on cryptographic ratchets

被引:4
|
作者
Karbasi, Amir Hassani [1 ]
Shahpasand, Siyamak [2 ]
机构
[1] Khazar Univ, Dept Comp Sci, Baku, Azerbaijan
[2] Univ Tabriz, Dept Comp Engn, Tabriz, Iran
来源
JOURNAL OF SUPERCOMPUTING | 2021年 / 77卷 / 04期
关键词
Double Ratchet algorithm; Lightweight end-to-end encryption; Cryptographic key distribution; Sensor networks; IoT; Cybersecurity;
D O I
10.1007/s11227-020-03411-x
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
For many systems, safe connectivity is an important requirement, even if the transmitting machines are resource-constrained. The advent of the Internet of Things (IoT) has also increased the demand for low-power devices capable of connecting with each other or sending data to a central processing site. The IoT allows many applications in a smart environment, such as outdoor activity control, smart energy, infrastructure management, environmental sensing, or cyber-security issues. Security in such situations remains an open challenge because of the resource-constrained design of sensors and objects, or the multi-purpose adversaries may target the process during the life cycle of a smart sensor. This paper discusses widely used protocols that provide safe communications for various applications in IoT and also different attacks are defined. In this paper, to protect the IoT objects and sensors, we propose a comprehensive and lightweight security protocol based on Cryptographic Ratchets. That is, an encrypted messaging protocol using the Double Ratchet Algorithm is defined which we call Singleton, and the implementation of protocol is tested and compared to the implementation of the IoT standard protocols and a post-quantum version of the protocol. Various cryptographic primitives are also evaluated, and their suitability for use in the protocol is tested. The results show that the protocol as the building stone not only enables efficient resource-wise protocols and architectures but also provides advanced and scalable IoT sensors. Our design and analysis demonstrate that Singleton security architecture can be easily integrated into existing network protocols such as IEEE 802.15.4 or OMA LWM2M, which offers several benefits that existing approaches cannot offer both performance and important security services. For chat applications such as WhatsApp, Skype, Facebook Private Messenger, Google Allo, and Signal, a cryptographic ratchet-based protocol provides end-to-end encryption, forward secrecy, backward secrecy, authentication, and deniability.
引用
收藏
页码:3516 / 3554
页数:39
相关论文
共 50 条
  • [31] End-to-End Delay and Energy Efficient Routing Protocol for Underwater Wireless Sensor Networks
    Ali, Tariq
    Jung, Low Tang
    Faye, Ibrahima
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 79 (01) : 339 - 361
  • [32] End-to-End Delay and Energy Efficient Routing Protocol for Underwater Wireless Sensor Networks
    Tariq Ali
    Low Tang Jung
    Ibrahima Faye
    Wireless Personal Communications, 2014, 79 : 339 - 361
  • [33] Enabling End-to-End Communication Between Wireless Sensor Networks and the Internet Based on 6Lo WPAN
    LUO Bingqing
    SUN Zhixin
    Chinese Journal of Electronics, 2015, 24 (03) : 633 - 638
  • [34] Efficient and secure searchable encryption protocol for cloud-based Internet of Things
    Wu, Libing
    Chen, Biwen
    Choo, Kim-Kwang Raymond
    He, Debiao
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 111 : 152 - 161
  • [35] A Secure Query Protocol for Multi-layer Wireless Sensor Networks Based on Internet of Things
    Lin T.
    Wu P.
    Gao F.
    Wang L.
    Revue d'Intelligence Artificielle, 2019, 33 (02) : 145 - 149
  • [36] A lifetime-optimized end-to-end encryption scheme for sensor networks allowing in-network processing
    Armknecht, Frederik
    Westhoff, Dirk
    Girao, Joao
    Hessler, Alban
    COMPUTER COMMUNICATIONS, 2008, 31 (04) : 734 - 749
  • [37] Trust based Security Solution for Internet of Things Healthcare Solution: An End-to-End Trustworthy Architecture
    Jaigirdar, Fariha Tasmin
    PROCEEDINGS OF THE 2018 ACM INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND UBIQUITOUS COMPUTING AND PROCEEDINGS OF THE 2018 ACM INTERNATIONAL SYMPOSIUM ON WEARABLE COMPUTERS (UBICOMP/ISWC'18 ADJUNCT), 2018, : 1757 - 1760
  • [38] A DTLS Based End-To-End Security Architecture for the Internet of Things with Two-Way Authentication
    Kothmayr, Thomas
    Schmitt, Corinna
    Hu, Wen
    Bruenig, Michael
    Carle, Georg
    PROCEEDINGS OF THE 37TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS WORKSHOPS (LCN 2012), 2012, : 956 - 963
  • [39] End-to-end authentication based secure communication in vehicular ad hoc networks (VANET)
    Kumar, Ankit
    Sharma, Neeraj
    Kumar, Abhishek
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (01): : 219 - 229
  • [40] A Novel Secure End-to-End IoT Communication Scheme Using Lightweight Cryptography Based on Block Cipher
    Winarno, Agus
    Sari, Riri Fitri
    APPLIED SCIENCES-BASEL, 2022, 12 (17):