SecureIoT: Hop-Count Based Service-Oriented Efficient Security Solution for IoT

Internet of Things (IoT) is a network of physical devices which are accessible through the Internet. All the devices are assigned with an IP address and are competent enough to collect data and provide some services. The installed technology and software used in all these smart items help them to interact with the end-user(s). Thus the IoT network becomes more vulnerable to attacks by external entities. Consequently, it is required to check the leakage of any information during message transmission in the network. Message injection, relay attacks, and side channel attacks by a malicious node can result in privacy loss and security hacks. Service-Oriented Architecture help vendors provide services to the consumer over a network following some protocols. In this paper we have implemented a security scheme that can be suitable for Service Oriented Architecture (SOA) based IoT network. The proposed scheme allows to transfer data in a network only if the public key (encrypted hop-count) received by the packet matches with the public key(decrypted hop-count) between the source and destination node stored in the routing table. Otherwise, the data is considered to be malicious and discarded from the network. A non-cooperative Stackelberg game based mathematical model is presented, which considers defenders as leaders and attackers as followers. We have simulated our proposed scheme and have compared it with the existing security and authentication scheme, UAKMP, in identical conditions. From the analysis of the results we evaluate that, SecureIoT has improved performance with reduced communication overheads.

[1]  James Webb Game Theory: Decisions, Interaction and Evolution , 2006 .

[2]  KrishnaKanth Gupta,et al.  Internet of Things: Security challenges for next generation networks , 2016, 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH).

[3]  Jia Guo,et al.  Trust management for service composition in SOA-based IoT systems , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).

[4]  Xinyu Yang,et al.  On False Data Injection Attacks against Distributed Energy Routing in Smart Grid , 2012, 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems.

[5]  Xinyu Yang,et al.  Towards Multistep Electricity Prices in Smart Grid Electricity Markets , 2016, IEEE Transactions on Parallel and Distributed Systems.

[6]  Shivaji Kulkarni,et al.  Internet of Things (IoT) security , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).

[7]  Valérie Issarny,et al.  Revisiting Service-Oriented Architecture for the IoT: A Middleware Perspective , 2016, ICSOC.

[8]  Jorge Sá Silva,et al.  Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.

[9]  Sarbani Roy,et al.  Negotiation based service brokering using game theory , 2014, 2014 Applications and Innovations in Mobile Computing (AIMoC).

[10]  Walid Saad,et al.  Game Theory in Wireless and Communication Networks: Applications of game theory in communications and networking , 2011 .

[11]  Alexander S. Poznyak,et al.  Stackelberg security games: Computing the shortest-path equilibrium , 2015, Expert Syst. Appl..

[12]  Joanna Kolodziej,et al.  Stackelberg security games: models, applications and computational aspects , 2016 .

[13]  Mauro Conti,et al.  Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks , 2018, IEEE Internet of Things Journal.

[14]  Zhu Han,et al.  Game Theory in Wireless and Communication Networks: Theory, Models, and Applications , 2011 .

[15]  Ce Zhang,et al.  Research on Unified Architecture of IoT System , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).

[16]  Li Duan,et al.  Event-Driven SOA for IoT Services , 2014, 2014 IEEE International Conference on Services Computing.

[17]  Xinyu Yang,et al.  A Novel En-route Filtering Scheme against False Data Injection Attacks in Cyber-Physical Networked Systems , 2012, 2012 IEEE 32nd International Conference on Distributed Computing Systems.