Energy Efficiency in Security of 5G-Based IoT: An End-to-End Adaptive Approach

The challenging problem of energy efficiency in security of the Internet of Things (IoT) is tackled in this article. The authors consider the upcoming generation of mobile networks, 5G, as a communication architecture for the IoT. The concept of adaptive security is adopted, which is based on adjusting the security level as per the changing context. It has the potential of reducing energy consumption by adapting security rather than always considering the worst case, which is energy consuming. The consideration of 5G introduces new dynamics that can be exploited to perform more adaptation. The proposed solution introduces an intelligence in the application of security, from the establishment phase to the use phase (end-to-end). The security level related to the used cryptographic algorithm/key is adapted for each node during the establishment phase, so to match with the duration of the provided services. A new strategy is formulated that considers both IoT and 5G characteristics. In addition, a solution based on the framework of the coalitional game is proposed in order to associate the deployed objects with the optimized security levels. Moreover, the application of security is also adapted during the use phase according to the threat level. Trust management is used to evaluate the threat level among the network nodes, while existing works focus on performing the adaptation during the use phase. The proposed approach achieves more adaptation through the consideration of both IoT and 5G dynamics. The analysis and performance evaluations are conducted to show the effectiveness of the proposed end-to-end approach.

[1]  Mohamed F. Younis,et al.  Adaptive security provision for increased energy efficiency in Wireless Sensor Networks , 2009, 2009 IEEE 34th Conference on Local Computer Networks.

[2]  Laura Galluccio,et al.  SDN-WISE: Design, prototyping and experimentation of a stateful SDN solution for WIreless SEnsor networks , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[3]  Giacomo Morabito,et al.  Software Defined Wireless Networks: Unbridling SDNs , 2012, 2012 European Workshop on Software Defined Networking.

[4]  Alberto Ferrante,et al.  QoS and security in energy-harvesting wireless sensor networks , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).

[5]  Jennifer C. Hou,et al.  On deriving the upper bound of α-lifetime for large sensor networks , 2004, MobiHoc '04.

[6]  Alberto Ferrante,et al.  Gradual adaptation of security for sensor networks , 2010, 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).

[7]  Xenofon Fafoutis,et al.  Adaptive Security in ODMAC for Multihop Energy Harvesting Wireless Sensor Networks , 2015, Int. J. Distributed Sens. Networks.

[8]  Yu Meng,et al.  A Novel Deployment Scheme for Green Internet of Things , 2014, IEEE Internet of Things Journal.

[9]  Mohamed Hamdi,et al.  Game-based adaptive security in the Internet of Things for eHealth , 2014, 2014 IEEE International Conference on Communications (ICC).

[10]  Xinyu Yang,et al.  A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.

[11]  Xiaoqi Li,et al.  A trust model based routing protocol for secure ad hoc networks , 2004, 2004 IEEE Aerospace Conference Proceedings (IEEE Cat. No.04TH8720).

[12]  Yuanqing Xia,et al.  Optimal Online Data Dissemination for Resource Constrained Mobile Opportunistic Networks , 2017, IEEE Transactions on Vehicular Technology.

[13]  Mahesh K. Marina,et al.  Group Communications in Narrowband-IoT: Architecture, Procedures, and Evaluation , 2018, IEEE Internet of Things Journal.

[14]  Yu Wang,et al.  Mitigating Interference via Power Control for Two-Tier Femtocell Networks: A Hierarchical Game Approach , 2019, IEEE Transactions on Vehicular Technology.

[15]  Yu Wang,et al.  Delay-Constrained Utility Maximization for Video Ads Push in Mobile Opportunistic D2D Networks , 2018, IEEE Internet of Things Journal.

[16]  Abdelmadjid Bouabdallah,et al.  TAS-IoT: Trust-Based Adaptive Security in the IoT , 2016, 2016 IEEE 41st Conference on Local Computer Networks (LCN).

[17]  Yinghua Ye,et al.  Resource-aware self-adaptive security provisioning in mobile ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[18]  Tarik Taleb,et al.  "Anything as a Service" for 5G Mobile Systems , 2016, IEEE Network.

[19]  Dominique Barthel,et al.  Routing Metrics Used for Path Calculation in Low-Power and Lossy Networks , 2012, RFC.

[20]  Hwee Pink Tan,et al.  Sensor OpenFlow: Enabling Software-Defined Wireless Sensor Networks , 2012, IEEE Communications Letters.

[21]  Anantha Chandrakasan,et al.  Bounding the lifetime of sensor networks via optimal role assignments , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[22]  Abdelmadjid Bouabdallah,et al.  Energy-efficient mechanisms in security of the internet of things: A survey , 2017, Comput. Networks.

[23]  Jeffrey G. Andrews,et al.  What Will 5G Be? , 2014, IEEE Journal on Selected Areas in Communications.

[24]  Stephen E. Deering,et al.  Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification , 2006, RFC.

[25]  Falko Dressler,et al.  On the lifetime of wireless sensor networks , 2009, TOSN.

[26]  P. Keeratiwintakorn,et al.  Energy Efficient Security Services for Limited Wireless Devices , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.

[27]  Bin Han,et al.  Network Slicing to Enable Scalability and Flexibility in 5G Mobile Networks , 2017, IEEE Communications Magazine.

[28]  Adam Dunkels,et al.  Cross-Level Sensor Network Simulation with COOJA , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.

[29]  Philip Levis,et al.  RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.