An efficient scheme for anonymous communication in IoT

Security and privacy are challenging task in resource constrained in Internet of things (IoT) and Wireless Sensor Networks (WSN). Hence, anonymity and trust are prominent for many common IoT and WSN applications, in which we conceal nodes identity and give confidential data to a trusted node. The majority of exiting IoT security solutions cannot achieve complete security needs and/or have large computation overheads. In this paper we design a secure generic model for IoT and WSN to ensure anonymity, data secrecy and trust between nodes. Our work is based on lightweight key agreement protocol, the Identity Based Encryption (IBE) and Pseudonym Based Encryption (PBC).

[1]  David E. Culler,et al.  TinyOS: An Operating System for Sensor Networks , 2005, Ambient Intelligence.

[2]  Xiaojiang Du,et al.  Towards Efficient Anonymous Communications in Sensor Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[3]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[4]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[5]  Abdullah Al-Mahmud,et al.  Secure Sensor Node Authentication in Wireless Sensor Networks , 2012 .

[6]  Chunhua Jin,et al.  Secure and efficient data transmission in the Internet of Things , 2015, Telecommunication Systems.

[7]  Mihir Bellare,et al.  The Security of Cipher Block Chaining , 1994, CRYPTO.

[8]  Colin Boyd,et al.  ID-based One-pass Authenticated Key Establishment , 2008, AISC.

[9]  Peter Friess,et al.  Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems , 2013 .

[10]  Adam Dunkels,et al.  Contiki - a lightweight and flexible operating system for tiny networked sensors , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[11]  Utz Roedig,et al.  Securing communication in 6LoWPAN with compressed IPsec , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).

[12]  Dijiang Huang Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks , 2007, Int. J. Secur. Networks.

[13]  Margaret Salter,et al.  Fundamental Elliptic Curve Cryptography Algorithms , 2011, RFC.

[14]  Abdellatif Mtibaa,et al.  Hash function and Digital Signature based on elliptic curve , 2013, 14th International Conference on Sciences and Techniques of Automatic Control & Computer Engineering - STA'2013.