Reliable and secure data transfer in IoT networks

  • PDF / 1,924,706 Bytes
  • 14 Pages / 595.276 x 790.866 pts Page_size
  • 21 Downloads / 245 Views

DOWNLOAD

REPORT


(0123456789().,-volV)(0123456789(). ,- volV)

Reliable and secure data transfer in IoT networks Sarada Prasad Gochhayat1 • Chhagan Lal2 • Lokesh Sharma3 • D. P. Sharma3 • Deepak Gupta4 Jose Antonio Marmolejo Saucedo5 • Utku Kose6



 Springer Science+Business Media, LLC, part of Springer Nature 2019

Abstract With the rapid technological improvements in mobile devices and their inclusion in Internet of Things (IoT), secure key management becomes mandatory to ensure security of information exchange. For instance, IoT applications, such as smart health-care and smart homes, provide automated services to the users with less or no user intervention. As these application use user-sensitive data, ensuring their security and privacy should be paramount, especially during the key management process. However, traditional approaches for key management will not suit well in IoT environment because of the inherent resource constraint property of IoT devices. In this paper, we propose a novel distributed key management scheme for IoT ecosystem. The proposed scheme efficiently provides security to IoT devices by delegating most of the resource consuming cryptographic processing to a local entity. This entity coordinates with other peer entities to provide a distributed key as well as an authentication mechanism to network devices. In particular, the proposed scheme exploits the advantages of mobile agents by deploying them in different subnetworks as and when required: (1) to process the cryptography work for the IoT devices, and (2) to act as an local authenticated entity to perform fast authentication process. To verify the effectiveness and correctness of our proposed scheme, we have simulated it in a large IoT scenario and evaluated against relevant metrics that includes user mobility, certification generation time, and communication overhead. Keywords Security  Internet of Things  Mobile agents  Resource exhaustion  Wireless networks

1 Introduction The rapid increase in the number of connected devices to the Internet, and the significant advances in information and heterogeneous communication technologies have led

to great emergence in the Internet of Things (IoT). Due to these advances, IoT systems such as IoT health care [1], IoT learning [2], and tourist guide [3] are being heavily used in real world. These systems would allow the users to get the personalized services intelligently by using their 1

Virginia Modeling Analysis and Simulation Center, Old Dominion University, Norfolk, VA, USA

Sarada Prasad Gochhayat [email protected]

2

Department of Mathematics, University of Padova, Padova, Italy

Chhagan Lal [email protected]

3

Department of IT, Manipal University Jaipur, Jaipur, India

4

Maharaja Agrasen Institute of Technology, New Delhi, Delhi, India

5

Universidad Panamericana, Mexico, Mexico

6

Suleyman Demirel University, Isparta, Turkey

& Utku Kose [email protected]

Lokesh Sharma [email protected] D. P. Sharma [email protected] Deepak Gupta [email protected] Jos