A secure inter-domain communication for IoT devices

Nowadays, a multitude of sensors are used to gather data in several fields from smart buildings, to industries, to cars, etc.. These sensor data are instrumental in making smart decisions. In order to send data to end users, these sensors are connected to the Internet of Things (IoT) devices. Usually, the intra-domain data transmission is secure, indeed sensors and consumers of data can belong to the same Virtual Private Network (VPN). Security problems can be raised in the inter-domain data transmission because the transmitting channel is not ciphered nor is the identity of devices certain. Therefore, in case of attack, for consumers of data is not possible to recognize real data gathered from devices from fake data sent by attackers. In order to address this challenge, in this paper we present a novel method to secure data acquired from sensors connected to IoT devices. In particular, utilizing a Public Key Infrastructure (PKI) and the ESP32 microcontroller, we can send data privately to each recipient. In order to validate the system, we performed specific analysis considering different levels of security (512, 1024, 2048 bits key length) and increasing number of connected sensors (0, 1, 5, 10, 20). In particular, we considered the time to set up the IoT device and to cipher packets. Experiments have shown that the time required for the setup increases with the increase of the key length. Considering the 512 and 1024 bits keys, the time required to cipher data coming from sensors increase with the increasing of sensors. Instead, for the 2048 bits key length the ciphering time is almost constant, this because packet size and key length are comparable.

[1]  Hannes Tschofenig,et al.  Securing the Internet of Things: A Standardization Perspective , 2014, IEEE Internet of Things Journal.

[2]  Tao Zhang,et al.  Fog and IoT: An Overview of Research Opportunities , 2016, IEEE Internet of Things Journal.

[3]  Tetsutaro Uehara,et al.  Fog Computing: Issues and Challenges in Security and Forensics , 2015, 2015 IEEE 39th Annual Computer Software and Applications Conference.

[4]  Maria Fazio,et al.  An approach for the secure management of hybrid cloud-edge environments , 2019, Future Gener. Comput. Syst..

[5]  Tzonelih Hwang,et al.  BSN-Care: A Secure IoT-Based Modern Healthcare System Using Body Sensor Network , 2016, IEEE Sensors Journal.

[6]  Arwa Alrawais,et al.  Fog Computing for the Internet of Things: Security and Privacy Issues , 2017, IEEE Internet Computing.

[7]  Antonio Puliafito,et al.  Towards the Integration between IoT and Cloud Computing: An Approach for the Secure Self-Configuration of Embedded Devices , 2015, Int. J. Distributed Sens. Networks.

[8]  Gunasekaran Manogaran,et al.  A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system , 2017, Future Gener. Comput. Syst..

[9]  Manuel Díaz,et al.  On blockchain and its integration with IoT. Challenges and opportunities , 2018, Future Gener. Comput. Syst..

[10]  Roksana Boreli,et al.  Network-level security and privacy control for smart-home IoT devices , 2015, 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[11]  nbspK .Aparna Reddy,et al.  Securing IOT for Smart Home System , 2016 .

[12]  Donghyun Kim,et al.  On security and privacy issues of fog computing supported Internet of Things environment , 2015, 2015 6th International Conference on the Network of the Future (NOF).

[13]  Eduardo B. Fernández,et al.  An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.

[14]  Philippe Massonet,et al.  Security in Lightweight Network Function Virtualisation for Federated Cloud and IoT , 2017, 2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud).

[15]  Mirza Aamir Mehmood,et al.  Implementation of Eap with RSA for Enhancing The Security of Cloud Computing , 2012 .

[16]  Cong Wang,et al.  Toward Secure and Dependable Storage Services in Cloud Computing , 2012, IEEE Transactions on Services Computing.

[17]  Ivan Stojmenovic,et al.  The Fog computing paradigm: Scenarios and security issues , 2014, 2014 Federated Conference on Computer Science and Information Systems.

[18]  Divneet Singh Kapoor,et al.  Create Your Own Internet of Things: A survey of IoT platforms. , 2017, IEEE Consumer Electronics Magazine.

[19]  Mohit Bhansali,et al.  Enhancing Cloud Computing Security using AES Algorithm , 2013 .

[20]  Mubashir Husain Rehmani,et al.  Applications of Blockchains in the Internet of Things: A Comprehensive Survey , 2019, IEEE Communications Surveys & Tutorials.

[21]  Qun Li,et al.  A Survey of Fog Computing: Concepts, Applications and Issues , 2015, Mobidata@MobiHoc.

[22]  Rodrigo Roman,et al.  Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..

[23]  Yuan-Ting Zhang,et al.  A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network , 2016, Sensors.

[24]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[25]  Yuriy Vagapov,et al.  Comparative analysis and practical implementation of the ESP32 microcontroller module for the internet of things , 2017, 2017 Internet Technologies and Applications (ITA).

[26]  Maria Fazio,et al.  SE CLEVER: A secure message oriented Middleware for Cloud federation , 2013, 2013 IEEE Symposium on Computers and Communications (ISCC).

[27]  Jörg Schwenk,et al.  On Technical Security Issues in Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.

[28]  Fermín Galán Márquez,et al.  How to Develop IoT Cloud e-Health Systems Based on FIWARE: A Lesson Learnt , 2019, J. Sens. Actuator Networks.

[29]  Varghese Paul,et al.  A Secure and Efficient Lightweight Symmetric Encryption Scheme for Transfer of Text Files between Embedded IoT Devices , 2019, Symmetry.

[30]  Satish Muppidi,et al.  Data Security in Cloud Computing with Elliptic Curve Cryptography , 2012 .