An Efficient Security Scheme for the Internet of Things with Resource-Constrained Devices

被引:0
|
作者
Wu, Xin-Wen [1 ]
Farag, Waleed [1 ]
Ali, Sanwar [1 ]
Kulkarni, Siddhivinayak [2 ]
机构
[1] Indiana Univ Penn, Dept Math & Comput Sci, Indiana, PA 15705 USA
[2] MIT WPU, Dept Comput Sci & Engn, Pune, Maharashtra, India
关键词
Internet of Things; Cyber-physical systems; Wireless sensor networks; Security; Efficiency; Key management; Encryption; Authentication;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the Internet of Things (IoT), the entire physical infrastructure can be closely coupled with information and communication technologies. In a typical IoT architecture, a gateway serves as the mediator which connects the physical devices of an IoT local system to a wide area network. Although the traditional network security mechanisms, such as IPsec, can be applied to protect the wide area network, they are not desirable to the IoT local system, due to their computationallyintensive procedures. In this paper, an efficient security scheme for IoT local systems is presented. The proposed security scheme is comprised of a novel key management protocol, an efficient and secure encryption protocol, and efficient authentication protocols. The security scheme is secure against various attacks, and it is much more efficient than IPsec, thus, it is highly desirable to IoT local systems. The application of the security scheme to clustered sensor networks (a typical IoT application) is studied. The comparison of the security scheme with the existing security mechanism, SecLEACH, shows that the proposed security scheme is more secure and outperforms SecLEACH with regard to network connectivity and efficiency.
引用
收藏
页码:679 / 685
页数:7
相关论文
共 50 条
  • [41] Energy-efficient Resource Directory Update Scheme for Constrained Application Protocol in Internet of Things
    Kim, Sungmo
    Kwon, Jung-Hyok
    Lee, Sol-Bee
    Park, Jaehoon
    Kim, Dongwan
    Kim, Eui-Jik
    SENSORS AND MATERIALS, 2018, 30 (03) : 431 - 437
  • [42] Discretized-Isolation Forest: Memory- and Compute-Efficient Unsupervised Anomaly Detection for Resource-Constrained Internet of Things Edge Devices
    Ortega, Eduardo
    Su, Fei
    Chattopadhyay, Rita
    Chakrabarty, Krishnendu
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (02): : 1699 - 1717
  • [43] Resource-Constrained EXtended Reality Operated With Digital Twin in Industrial Internet of Things
    Kamdjou, Hugues M.
    Baudry, David
    Havard, Vincent
    Ouchani, Samir
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2024, 5 : 928 - 950
  • [44] A Full-Healing Key Distribution Scheme for Resource-Constrained Devices
    Messai, Sarra
    Messai, Mohamed-Lamine
    Seba, Hamida
    Aliouat, Zibouda
    2019 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES FOR DISASTER MANAGEMENT (ICT-DM 2019), 2019,
  • [45] A Lightweight XMPP Publish/Subscribe Scheme for Resource-Constrained IoT Devices
    Wang, Heng
    Xiong, Daijin
    Wang, Ping
    Liu, Yuqiang
    IEEE ACCESS, 2017, 5 : 16393 - 16405
  • [46] Energy-efficient routing paradigm for resource-constrained Internet of Things-based cognitive smart city
    Verma, Sandeep
    EXPERT SYSTEMS, 2022, 39 (05)
  • [47] Efficient Resource-Constrained Monitoring
    Moraney, Jalil
    Raz, Danny
    PROCEEDINGS OF THE IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2022, 2022,
  • [48] A security authorization scheme for smart home Internet of Things devices
    Chifor, Bogdan-Cosmin
    Bica, Ion
    Patriciu, Victor-Valeriu
    Pop, Florin
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 86 : 740 - 749
  • [49] Server-Aided Attribute-Based Signature With Revocation for Resource-Constrained Industrial-Internet-of-Things Devices
    Cui, Hui
    Deng, Robert H.
    Liu, Joseph K.
    Yi, Xun
    Li, Yingjiu
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) : 3724 - 3732
  • [50] Remote Gaming on Resource-Constrained Devices
    Reza, Waazim
    Kalva, Hari
    Kaufman, Richard
    APPLICATIONS OF DIGITAL IMAGE PROCESSING XXXIII, 2010, 7798