Lightweight Authenticated-Encryption Scheme for Internet of Things Based on Publish-Subscribe Communication

The resource-constrained nature and large-scale adoption of Internet of Things (IoT) have a significant challenge for securing IoT applications. This necessitates a robust and lightweight security architecture and schemes as the existing traditional Internet security architecture and protocols require huge resources and lack of end-to-end security mechanism. In this research, a resource efficient end-to-end security scheme has been proposed by offloading computations and storage of security parameters to fog nodes in the vicinity. In addition, a symmetric-key payload encryption has been used to minimize the overhead of message communication in the resource-contested IoT environment. The analysis shows that the proposed scheme outperforms Transport Layer Security (TLS) in resource usage while it maintains equivalent authenticated end-to-end communication between communicating IoT nodes. The proposed end-to-end security scheme saves more communication bandwidth and incurs less overhead as compared to existing TLS-based security schemes. In particular, the proposed system uses less number of handshakes and achieves a decrease in the number of transmitted messages (approximately 184 bytes as compared to compared TSL message size of 332 bytes) for every handshake. Further, it has been demonstrated through experiments that the proposed security method incurs less overheads as compared to the TLS bandwidth consumption considering a single connection session during message subscription.

[1]  Muhammad Alam,et al.  A payload-based mutual authentication scheme for Internet of Things , 2017, Future Gener. Comput. Syst..

[2]  George C. Hadjichristofi,et al.  Internet of Things: Security vulnerabilities and challenges , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).

[3]  Wei Ni,et al.  A Comprehensive Security Framework for Publish/Subscribe-Based IoT Services Communication , 2019, IEEE Access.

[4]  Budi Rahardjo,et al.  Attack scenarios and security analysis of MQTT communication protocol in IoT system , 2017, 2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI).

[5]  Volker Turau,et al.  A Self-Stabilizing Publish/Subscribe Middleware for IoT Applications , 2018, ACM Trans. Cyber Phys. Syst..

[6]  Ioannis G. Askoxylakis,et al.  Lightweight & secure industrial IoT communications via the MQ telemetry transport protocol , 2017, 2017 IEEE Symposium on Computers and Communications (ISCC).

[7]  Prem Prakash Jayaraman,et al.  OpenIoT: Open Source Internet-of-Things in the Cloud , 2014, OpenIoT@SoftCOM.

[8]  Imran A. Zualkernan,et al.  A smart home energy management system using IoT and big data analytics approach , 2017, IEEE Transactions on Consumer Electronics.

[9]  Im-Yeong Lee,et al.  Mutual Authentication Scheme Based on Lattice for NFC-PCM Payment Service Environment , 2016 .

[10]  Soo Young Shin,et al.  Fog Computing-Based Smart Health Monitoring System Deploying LoRa Wireless Communication , 2019 .

[11]  Min Jia,et al.  IoT Infrastructure and Potential Application to Smart Grid Communications , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[12]  Arumugam Paventhan,et al.  An IoT based 6LoWPAN enabled experiment for water management , 2015, 2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS).

[13]  Shusen Yang,et al.  A survey on the ietf protocol suite for the internet of things: standards, challenges, and opportunities , 2013, IEEE Wireless Communications.

[14]  Yehuda Lindell,et al.  Introduction to Modern Cryptography , 2004 .

[15]  Wei Peng,et al.  A secure publish/subscribe protocol for Internet of Things using identity-based cryptography , 2016, 2016 5th International Conference on Computer Science and Network Technology (ICCSNT).

[16]  Kah Phooi Seng,et al.  A comprehensive survey of modern symmetric cryptographic solutions for resource constrained environments , 2015, J. Netw. Comput. Appl..

[17]  Chao-Chun Chen,et al.  An Extensible and Transparent Thing-to-Thing Security Enhancement for MQTT Protocol in IoT Environment , 2019, 2019 Global IoT Summit (GIoTS).

[18]  Tao Zhang,et al.  Fog Computing , 2017, IEEE Internet Comput..

[19]  M. Ylianttila,et al.  Group Key Establishment for Enabling Secure Multicast Communication in Wireless Sensor Networks Deployed for IoT Applications , 2015, IEEE Access.

[20]  Khurram J Mohammed,et al.  Wireless home automation and security system using MQTT protocol , 2017, 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT).

[21]  Soo Young Shin,et al.  On the Application of IoT: Meteorological Information Display System Based on LoRa Wireless Communication , 2018 .

[22]  Panita Pongpaibool,et al.  Authorization mechanism for MQTT-based Internet of Things , 2016, 2016 IEEE International Conference on Communications Workshops (ICC).

[23]  V. G. Puranik,et al.  IOT based vehicle traffic congestion control and monitoring system , 2017, 2017 2nd International Conference for Convergence in Technology (I2CT).

[24]  G. Shanmugasundaram,et al.  A comprehensive review on cloud computing security , 2017, 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS).

[25]  Ivan Stojmenovic,et al.  The Fog computing paradigm: Scenarios and security issues , 2014, 2014 Federated Conference on Computer Science and Information Systems.

[26]  Saad El Jaouhari,et al.  A secure design of WoT services for smart cities. (Conception sécurisée de services IoT pour les villes connectées) , 2018 .

[27]  Prem Prakash Jayaraman,et al.  Fog Computing: Survey of Trends, Architectures, Requirements, and Research Directions , 2018, IEEE Access.

[28]  Tiago Gomes,et al.  A 6LoWPAN Accelerator for Internet of Things Endpoint Devices , 2018, IEEE Internet of Things Journal.

[29]  Yutaka Arakawa,et al.  A Smart Glove to Track Fitness Exercises by Reading Hand Palm , 2019, J. Sensors.

[30]  Lei Shu,et al.  Survey of Fog Computing: Fundamental, Network Applications, and Research Challenges , 2018, IEEE Communications Surveys & Tutorials.

[31]  Sherali Zeadally,et al.  Fog Computing Architecture, Evaluation, and Future Research Directions , 2018, IEEE Communications Magazine.

[32]  Sabeen Javaid,et al.  Smart traffic management system using Internet of Things , 2018, 2018 20th International Conference on Advanced Communication Technology (ICACT).

[33]  Naveen K. Chilamkurti,et al.  Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..