End-to-End IoT Security Middleware for Cloud-Fog Communication

IoT (Internet of Things) devices such as sensors have been actively used in 'fogs' to provide critical data during e.g., disaster response scenarios or in-home healthcare. Since IoT devices typically operate in resource-constrained computing environments at the network-edge, data transfer performance to the cloud as well as end-to-end security have to be robust and customizable. In this paper, we present the design and implementation of a middleware featuring "intermittent" and "flexible" end-to-end security for cloud-fog communications. Intermittent security copes with unreliable network connections, and flexibility is achieved through security configurations that are tailored to application needs. Our experiment results show how our middleware that leverages static pre-shared keys forms a promising solution for delivering light-weight, fast and resource-aware security for a variety of IoT-based applications.

[1]  Djamel Tandjaoui,et al.  A novel lightweight authentication scheme for heterogeneous wireless sensor networks in the context of Internet of Things , 2016, 2016 Wireless Telecommunications Symposium (WTS).

[2]  Jega Anish Dev Usage of botnets for high speed MD5 hash cracking , 2013 .

[3]  Marjorie Skubic,et al.  Automated In-Home Fall Risk Assessment and Detection Sensor System for Elders. , 2015, The Gerontologist.

[4]  Jan Zibuschka,et al.  Securing systems on the Internet of Things via physical properties of devices and communications , 2015, 2015 Annual IEEE Systems Conference (SysCon) Proceedings.

[5]  Mihail Popescu,et al.  Panacea's Glass: Mobile Cloud Framework for Communication in Mass Casualty Disaster Triage , 2015, 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering.

[6]  Giuseppe Piro,et al.  A standard compliant security framework for IEEE 802.15.4 networks , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).

[7]  Hannes Tschofenig,et al.  Comparison Studies between Pre-Shared and Public Key Exchange Mechanisms for Transport Layer Security , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[8]  Riccardo Bonetto,et al.  Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[9]  D. Lee,et al.  Hash Function Vulnerability Index and Hash Chain Attacks , 2007, 2007 3rd IEEE Workshop on Secure Network Protocols.

[10]  Magdy A. Bayoumi,et al.  Secure End-to-End key establishment protocol for resource-constrained healthcare sensors in the context of IoT , 2016, 2016 International Conference on High Performance Computing & Simulation (HPCS).

[11]  Vassilis Kostakos,et al.  Large-scale offloading in the Internet of Things , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[12]  Paul F. Syverson,et al.  A taxonomy of replay attacks [cryptographic protocols] , 1994, Proceedings The Computer Security Foundations Workshop VII.

[13]  Hanno Wirtz,et al.  Tailoring end-to-end IP security protocols to the Internet of Things , 2013, 2013 21st IEEE International Conference on Network Protocols (ICNP).