SINGLETON: A lightweight and secure end-to-end encryption protocol for the sensor networks in the Internet of Things based on cryptographic ratchets

被引:4
|
作者
Karbasi, Amir Hassani [1 ]
Shahpasand, Siyamak [2 ]
机构
[1] Khazar Univ, Dept Comp Sci, Baku, Azerbaijan
[2] Univ Tabriz, Dept Comp Engn, Tabriz, Iran
来源
JOURNAL OF SUPERCOMPUTING | 2021年 / 77卷 / 04期
关键词
Double Ratchet algorithm; Lightweight end-to-end encryption; Cryptographic key distribution; Sensor networks; IoT; Cybersecurity;
D O I
10.1007/s11227-020-03411-x
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
For many systems, safe connectivity is an important requirement, even if the transmitting machines are resource-constrained. The advent of the Internet of Things (IoT) has also increased the demand for low-power devices capable of connecting with each other or sending data to a central processing site. The IoT allows many applications in a smart environment, such as outdoor activity control, smart energy, infrastructure management, environmental sensing, or cyber-security issues. Security in such situations remains an open challenge because of the resource-constrained design of sensors and objects, or the multi-purpose adversaries may target the process during the life cycle of a smart sensor. This paper discusses widely used protocols that provide safe communications for various applications in IoT and also different attacks are defined. In this paper, to protect the IoT objects and sensors, we propose a comprehensive and lightweight security protocol based on Cryptographic Ratchets. That is, an encrypted messaging protocol using the Double Ratchet Algorithm is defined which we call Singleton, and the implementation of protocol is tested and compared to the implementation of the IoT standard protocols and a post-quantum version of the protocol. Various cryptographic primitives are also evaluated, and their suitability for use in the protocol is tested. The results show that the protocol as the building stone not only enables efficient resource-wise protocols and architectures but also provides advanced and scalable IoT sensors. Our design and analysis demonstrate that Singleton security architecture can be easily integrated into existing network protocols such as IEEE 802.15.4 or OMA LWM2M, which offers several benefits that existing approaches cannot offer both performance and important security services. For chat applications such as WhatsApp, Skype, Facebook Private Messenger, Google Allo, and Signal, a cryptographic ratchet-based protocol provides end-to-end encryption, forward secrecy, backward secrecy, authentication, and deniability.
引用
收藏
页码:3516 / 3554
页数:39
相关论文
共 50 条
  • [41] HETA: end-to-end delay analysis of enhanced centralized clustering protocol for wireless sensor networks
    C. Ambika Bhuvaneswari
    E. D. Kanmani Ruby
    International Journal of System Assurance Engineering and Management, 2022, 13 : 49 - 53
  • [42] HETA: end-to-end delay analysis of enhanced centralized clustering protocol for wireless sensor networks
    Bhuvaneswari, C. Ambika
    Ruby, E. D. Kanmani
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2022, 13 (SUPPL 1) : 49 - 53
  • [43] Delay-Based End-to-End Congestion Control for Wireless Sensor Networks
    Montes, Isabel
    Tiglao, Nestor
    Ocampo, Roel
    Festin, Cedric
    2015 SEVENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS, 2015, : 497 - 502
  • [44] Towards Lightweight Identity-Based Encryption for the Post-Quantum-Secure Internet of Things
    Gueneysu, Tim
    Oder, Tobias
    PROCEEDINGS OF THE EIGHTEENTH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED), 2017, : 319 - 324
  • [45] Delivering end-to-end Quality of Service through an Internet protocol based differentiated services domain
    Dullaert, JC
    Rahman, MH
    Mouftah, HT
    CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING 2001, VOLS I AND II, CONFERENCE PROCEEDINGS, 2001, : 335 - 340
  • [46] SCTP -: A multi-link end-to-end protocol for IP-based networks
    Jungmaier, A
    Rathgeb, EP
    Schopp, M
    Tüxen, M
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2001, 55 (01) : 46 - 54
  • [47] Provably Secure Dynamic Anonymous Authentication Protocol for Wireless Sensor Networks in Internet of Things
    Ding, Zixuan
    Xie, Qi
    SUSTAINABILITY, 2023, 15 (07)
  • [49] Cluster-based forwarding for reliable end-to-end delivery in wireless sensor networks
    Cao, Qing
    Abdelzaher, Tarek
    He, Tian
    Kravets, Robin
    INFOCOM 2007, VOLS 1-5, 2007, : 1928 - +
  • [50] A Secure End-to-End Verifiable Internet-Voting System Using Identity-Based Blind Signature
    Kumar, Mahender
    Chand, Satish
    Katti, C. P.
    IEEE SYSTEMS JOURNAL, 2020, 14 (02): : 2032 - 2041