Security Access Protocols in IoT Capillary Networks

Smart city services are enabled by a massive use of Internet of Things (IoT) technologies. The huge amount of sensors, and terminals with a great variety of typologies and applications, requires a secure way to manage them. Capillary networks can be seen as a short range extension of conventional access network in order to efficiently capture the IoT traffic, and are enablers for smart city services. They can include both IP and non-IP devices, and security can become an issue, especially when simple unidirectional communication devices are considered. The main goal of this paper is to analyze security aspects in IoT capillary networks including unidirectional and bidirectional IP or non-IP devices. We propose an algorithm for secure access for uni- and bi-directional devices. The security procedure is based on a secure key renewal (without any exchange in air), considering a local clock time and a time interval of key validity. Following previous work in 2014 by Giuliano et al., in this paper we assess the duration of the validity of the time window, and present extended simulation results in terms of (average) transmission time in a realistic scenario, i.e., including the presence of disturber(s), then providing indications for the setting of the duration of the key validity time window. Finally, we present the benchmark analysis in order to assess the effectiveness of our approach with respect to other existing standards, as well as the security analysis in terms of typical attacks.

[1]  Romeo Giuliano,et al.  Consumed power analysis for mobile radio system dimensioning , 2013, 2013 IEEE International Conference on Communications (ICC).

[2]  Dawn Song,et al.  The TESLA Broadcast Authentication Protocol , 2002 .

[3]  Alessandro Neri,et al.  Security Access Protocols in IoT Networks with Heterogenous Non-IP Terminals , 2014, 2014 IEEE International Conference on Distributed Computing in Sensor Systems.

[4]  Mark Nixon,et al.  A Comparison of WirelessHART™ and ISA100.11a , 2012 .

[5]  Jaeho Kim,et al.  A device software platform for consumer electronics based on the internet of things , 2015, IEEE Transactions on Consumer Electronics.

[6]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[7]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[8]  Dave Evans,et al.  How the Next Evolution of the Internet Is Changing Everything , 2011 .

[9]  Jian Shen,et al.  A Survey on Key Management for Body Sensor Network , 2015, 2015 First International Conference on Computational Intelligence Theory, Systems and Applications (CCITSA).

[10]  Maurizio A. Spirito,et al.  Denial-of-Service detection in 6LoWPAN based Internet of Things , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[11]  Gennaro Boggia,et al.  Standardized Protocol Stack for the Internet of (Important) Things , 2013, IEEE Communications Surveys & Tutorials.

[12]  A. Benslimane,et al.  Analytical study of security aspects in 6LoWPAN networks , 2013, 2013 5th International Conference on Information and Communication Technology for the Muslim World (ICT4M).

[13]  Tang Ming . Wei Lian. Si Tuo Lin Si,et al.  Cryptography and Network Security - Principles and Practice , 2015 .

[14]  J. Li,et al.  Smart city and the applications , 2011, 2011 International Conference on Electronics, Communications and Control (ICECC).

[15]  A Jesudoss,et al.  A SURVEY ON AUTHENTICATION ATTACKS AND COUNTERMEASURES IN A DISTRIBUTED ENVIRONMENT , 2014 .

[16]  Rochit Rajsuman System-On-A-Chip: Design and Test , 2000 .

[17]  Carsten Bormann,et al.  6LoWPAN: The Wireless Embedded Internet , 2009 .

[18]  Paulo S. L. M. Barreto,et al.  A survey on key management mechanisms for distributed Wireless Sensor Networks , 2010, Comput. Networks.

[19]  Witold Kinsner Towards cognitive security systems , 2012, 2012 IEEE 11th International Conference on Cognitive Informatics and Cognitive Computing.

[20]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[21]  Jorge Sá Silva,et al.  Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.

[22]  William Stallings,et al.  Cryptography and network security - principles and practice (3. ed.) , 2014 .

[23]  Geoff Mulligan,et al.  The 6LoWPAN architecture , 2007, EmNets '07.

[24]  Philip Levis,et al.  RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.

[25]  Alessandro Neri,et al.  End-to-end secure connection in heterogeneous networks for critical scenarios , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[26]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[27]  V. Kumar Chinnaiyan,et al.  Survey on smart grid technologies- smart metering, IoT and EMS , 2014, 2014 IEEE Students' Conference on Electrical, Electronics and Computer Science.

[28]  R. Giuliano,et al.  Security implementation in heterogeneous networks with long delay channel , 2012, 2012 IEEE First AESS European Conference on Satellite Telecommunications (ESTEL).

[29]  Evangelos N. Gazis,et al.  A survey of technologies for the internet of things , 2015, 2015 International Wireless Communications and Mobile Computing Conference (IWCMC).

[30]  Jiafu Wan,et al.  Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[31]  Miika Komu,et al.  Capillary networks - bridging the cellular and IoT worlds , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).