A Distributed Security Mechanism for Resource-Constrained IoT Devices

Internet of Things (IoT) devices have grown up to comprise embedded systems and sensors with the ability to connect, collect, and transmit data over the Internet. Although, solutions to secure IoT systems exist, Class-0 IoT devices with insufficient resources to support such solutions are considered too resource constrained for a secure communication. This paper provides a distributed security mechanism that targets Class-0 IoT devices. The research goal is to secure the entire data path in two segments; device-to-gateway and gateway-to-server data communications. The main concern in the provided solution is that lighter security operations with minimal resource requirements are performed in the device, while heavier tasks are performed in the gateway side. The proposed mechanism utilizes a symmetric encryption for data objects combined with the native wireless security to offer a layered security mechanism between the device and the gateway. In the offered solution, the IoT gateways provide additional protection by securing data using Transport Layer Security (TLS). The real-time experimental evaluations have proven the applicability of the proposed mechanism pertaining to the security assurance and the consumed resources of the target IoT devices.

[1]  Jiafu Wan,et al.  Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[2]  Oscar Garcia-Morchon,et al.  Securing the IP-based Internet of Things with DTLS , 2013 .

[3]  Andrzej Duda,et al.  OSCAR: Object security architecture for the Internet of Things , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.

[4]  Catherine Mulligan,et al.  From Machine-to-Machine to the Internet of Things - Introduction to a New Age of Intelligence , 2014 .

[5]  Javier Rubio-Loyola,et al.  Accurate real-time monitoring of bottlenecks and performance of packet trace collection , 2008, 2008 33rd IEEE Conference on Local Computer Networks (LCN).

[6]  Hakima Chaouchi,et al.  Introduction to the Internet of Things , 2013 .

[7]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[8]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[9]  Felix Wortmann,et al.  Internet of Things , 2015, Business & Information Systems Engineering.

[10]  Hesham F. A. Hamed,et al.  Advanced Encryption Standard Algorithm: Issues and Implementation Aspects , 2012, AMLTA.

[11]  Sye Keoh,et al.  A Hitchhiker's Guide to the (Datagram) Transport Layer Security Protocol for Smart Objects and Constrained Node Networks , 2013 .

[12]  Peng Li,et al.  WPA2 security-bandwith trade-off in 802.11n peer-peer WLAN for IPv4 and IPv6 using Windows XP and Windows 7 operating systems , 2012, 2012 IEEE Symposium on Computers and Communications (ISCC).

[13]  Carlo Maria Medaglia,et al.  An Overview of Privacy and Security Issues in the Internet of Things , 2010 .

[14]  Allen Storey There's nothing 'smart' about insecure connected devices , 2014, Netw. Secur..

[15]  Kai Zhao,et al.  A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.

[16]  Alexandre Santos,et al.  Internet of Things and Smart Objects for M-health Monitoring and Control , 2014 .

[17]  Zhihua Li,et al.  A Multi-layer Security Model for Internet of Things , 2012 .

[18]  Carsten Bormann,et al.  Terminology for Constrained-Node Networks , 2014, RFC.

[19]  Flora Malamateniou,et al.  Enabling data protection through PKI encryption in IoT m-Health devices , 2012, 2012 IEEE 12th International Conference on Bioinformatics & Bioengineering (BIBE).

[20]  Dirk Fox,et al.  Advanced Encryption Standard (AES) , 1999, Datenschutz und Datensicherheit.

[21]  Carsten Bormann,et al.  The Constrained Application Protocol (CoAP) , 2014, RFC.

[22]  Óscar García-Morchón,et al.  Securing the IP-based internet of things with HIP and DTLS , 2013, WiSec '13.

[23]  Eric Rescorla,et al.  Datagram Transport Layer Security Version 1.2 , 2012, RFC.

[24]  Ali Ismail Awad,et al.  Optimized hardware implementation of the advanced encryption standard algorithm , 2013, 2013 8th International Conference on Computer Engineering & Systems (ICCES).

[25]  Rodney Landrum,et al.  SQL CLR Cryptography , 2009 .

[26]  Athanasios V. Vasilakos,et al.  Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.

[27]  Changguang Wang,et al.  The Research of Security Technology in the Internet of Things , 2011, CSISE.

[28]  Yacine Challal,et al.  Internet of Things security and privacy: Design methods and optimization , 2015, Ad Hoc Networks.

[29]  Sarmad Ullah Khan,et al.  Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges , 2012, 2012 10th International Conference on Frontiers of Information Technology.

[30]  Javier Rubio-Loyola,et al.  Maximizing packet loss monitoring accuracy for reliable trace collections , 2008, 2008 16th IEEE Workshop on Local and Metropolitan Area Networks.

[31]  Thiemo Voigt,et al.  6LoWPAN Compressed DTLS for CoAP , 2012, 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems.