Securing Satellite Internet of Things by Perceiving Content Semantics

Satellite internet of things (S-IoT) is the combination of satellite mobile communication system and internet of things. It can provide vehicle and fleet management, container monitoring, oil and gas monitoring, meteorological data collection, emergency rescue and other related services. Despite the benefits, the communication pattern is built upon the traditional Internet architecture, which makes the information exchange and data protection nontrivial. This paper proposes an efficient and secure data communication paradigm for S-IoT by semantic-aware content perception. It incorporates a particular network model tailored for marine fishery application, and an efficient content encryption and retrieval strategy that achieves self-organized data access. The proposed scheme realizes different levels of data communication based on a set of combinatorial techniques, such as symmetric encryption, asymmetric encryption, content identification and caching. Unlike current data secure solutions that based on TCP/IP architecture, the proposed method does not involve online certificate distribution or complex key management, which especially facilities to implement in large-scale network scenarios. Simulations results demonstrate that our scheme provides a better flexibility for data access in S-IoT.

[1]  Neeli R. Prasad,et al.  A fuzzy approach to trust based access control in internet of things , 2013, Wireless VITAE 2013.

[2]  Tinghuai Ma,et al.  Access Control Policy Based On Friend Circle , 2020 .

[3]  Antonio F. Gómez-Skarmeta,et al.  TACIoT: multidimensional trust-aware access control system for the Internet of Things , 2016, Soft Comput..

[4]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[5]  Anar A. Hady Duty Cycling Centralized Hierarchical Routing Protocol With Content Analysis Duty Cycling Mechanism for Wireless Sensor Networks , 2020, Comput. Syst. Sci. Eng..

[6]  Alexander Afanasyev,et al.  Named Data Networking of Things (Invited Paper) , 2016, 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI).

[7]  Duo Liu,et al.  A Lightweight Three-Factor User Authentication Protocol for the Information Perception of IoT , 2019, Computers, Materials & Continua.

[8]  Patrick Crowley,et al.  Named data networking , 2014, CCRV.

[9]  Victor C. M. Leung,et al.  Multi-Method Data Delivery for Green Sensor-Cloud , 2017, IEEE Communications Magazine.

[10]  Nicola Zannone,et al.  Access control in Internet-of-Things: A survey , 2019, J. Netw. Comput. Appl..

[11]  B. B. Gupta,et al.  Security in Internet of Things: issues, challenges, taxonomy, and architecture , 2017, Telecommunication Systems.

[12]  Prateek Mittal,et al.  EASiER: encryption-based access control in social networks with efficient revocation , 2011, ASIACCS '11.