A secure multi-hop routing for IoT communication

This paper introduces a multi-hop routing protocol that enables secured IoT devices' communication. The routing protocol enables the IoT devices to authenticate before forming a new network or joining an existing network. The authentication uses multi-layer parameters to enhance the security of the communication. The proposed routing protocol embeds the multi-layer parameters into the routing algorithm, thus combining the authentication and routing processes without incurring significant overheads. The multi-layer parameters include a unique User-Controllable Identification, users' pre-agreed application(s), and a list of permitted devices, thus saving resources by maintaining smaller routing information. Experimental and field tests were conducted with results showing that our secure multi-hop routing is suitable to be deployed for IoT communication.

[1]  Vlad Trifa,et al.  Interacting with the SOA-Based Internet of Things: Discovery, Query, Selection, and On-Demand Provisioning of Web Services , 2010, IEEE Transactions on Services Computing.

[2]  Leilani Battle,et al.  Building the Internet of Things Using RFID: The RFID Ecosystem Experience , 2009, IEEE Internet Computing.

[3]  Imrich Chlamtac,et al.  Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.

[4]  Kan Siew Leong,et al.  A User-Controllable Multi-Layer Secure Algorithm for MANET , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).

[5]  Terry Koziniec,et al.  An experimental comparison of routing protocols in multi hop ad hoc networks , 2010, 2010 Australasian Telecommunication Networks and Applications Conference.

[6]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[7]  Albrecht Schmidt,et al.  Perci: Pervasive Service Interaction with the Internet of Things , 2009, IEEE Internet Computing.

[8]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[9]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[10]  Albrecht Schmidt,et al.  Embedded Interaction: Interacting with the Internet of Things , 2010, IEEE Internet Computing.

[11]  Gerd Kortuem,et al.  Smart objects as building blocks for the Internet of things , 2010, IEEE Internet Computing.